Malware August 28, 2015 Watch Out for CoreBot, New Stealer in the Wild 5 min read - IBM Security X-Force researchers recently discovered CoreBot, a seemingly generic malware that actually operates on a highly sophisticated level.
X-Force August 28, 2015 Side-Channel Attacks Against Multicore Processors in Cross-VM Scenarios: Part II 6 min read - Discussion of two side-channel attacks meant to retrieve sensitive information from a virtual machine (VM) on the same physical processor package.
Data Protection August 26, 2015 Blurred Lines: Researching the Ashley Madison Data 4 min read - Ashley Madison's recent data dump provided security researchers with a treasure trove of information — but is looking into the breach completely legal?
Intelligence & Analytics August 26, 2015 Preparing for the Global Era of Cybercrime 2 min read - The global era of cybercrime is upon us, and it's drastically changing the way organizations approach their cybersecurity strategies.
X-Force August 25, 2015 The Myth of the Omnipotent Hacker 3 min read - The way movies and television shows portray a hacker is far off from reality. In today's collaborative world, attackers are often working in crime rings.
X-Force August 24, 2015 Anonymity and Cryptocurrencies Enabling High-Stakes Extortion 3 min read - The third 2015 IBM X-Force Threat Intelligence Quarterly has been released, detailing the evolution of ransomware, anonymous routers and more.
Cloud Security August 21, 2015 Side-Channel Attacks Against Multicore Processors in Cross-VM Scenarios: Part I 4 min read - This discussion is meant to facilitate the understanding of side-channel attacks, which affect today's modern multicore processors.
Threat Intelligence August 20, 2015 Dyre Summer Renovation: Randomized Config File Names Keep Antivirus Engines Guessing 5 min read - Developers of the Dyre malware are keeping a close eye on security, making several changes to the file configuration to avoid detection.
Malware August 20, 2015 Diagnosing the Details of a Malware Infection 2 min read - As threat detection techniques evolve, so does the malware infection process, which typically includes advanced verions of downloaders, droppers and more.
Threat Intelligence August 18, 2015 Gozi Goes to Bulgaria — Is Cybercrime Heading to Less Charted Territory? 4 min read - The latest version of the Gozi banking Trojan looks to target banks in Bulgaria. This could be just the first instance of the malware in Eastern Europe.