Banking & Finance July 14, 2015 Dyre Malware Takes Summer Holiday in Spain 8 min read - The IBM X-Force Security Research team has discovered some interesting new information involving the Dyre Trojan, which is now targeting Spanish banks.
Intelligence & Analytics July 13, 2015 DEF CON Vs. Black Hat: Your Best Bet for Vegas 2015 3 min read - The DEF CON, Black Hat and BSides conferences all descend on Las Vegas this August. But which of these gatherings is the best bet for you?
Fraud Protection July 10, 2015 The Rising Threat of Attacks and How Organizational Silos Enable the Fraudsters 2 min read - Successfully reducing the threat of financial crime requires collaboration and intelligence sharing across different financial institutions.
July 7, 2015 Data Leak Could Let Almost Anyone Make ZeusVM Malware Variant 2 min read - Source code for the builder and control panel of the ZeusVM malware has been leaked online, creating powerful tools for would-be cybercriminals.
Endpoint July 7, 2015 Winning the Three-Legged Race Toward Endpoint Protection 2 min read - When it comes to endpoint protection, most IT security and operations teams function a lot like the pairs in a chaotic three-legged race.
Intelligence & Analytics July 1, 2015 Hidden Warnings: A Look at Indicators of Compromise (IoC) 2 min read - Modern techniques and tools can assist security professionals with digging in and identifying the key indicators of compromise (IoC) on a network.
Intelligence & Analytics June 24, 2015 Signature-Based Detection With YARA 4 min read - Security researchers on the lookout for another resource to help with malware detection should consider the pattern-matching tool YARA.
Advanced Threats June 22, 2015 Stopping the Evasive Stegoloader Malware 4 min read - The Stegoloader malware is built to be stealthy and evasive, so it requires an advanced protection program to detect its presence and stop any damage.
X-Force June 19, 2015 Navigating a Sea of Threat Intelligence Specifications 7 min read - Standards and specifications make threat intelligence sharing a more manageable and organized act, although competing standards may still muddy the waters.
Malware June 4, 2015 Detecting and Analyzing Kernel-Based Malware 3 min read - The intricacies of kernel-based malware make it difficult for security teams to identify potential problems, but the task is not impossible.