Incident Response March 13, 2018 Practicing Your Crisis Response: How Well Can You Handle Right of Boom? 4 min read - A data breach simulation is a great way to test your team's crisis response capabilities and prepare executives to deal with the aftermath of a cyberattack.
Malware February 26, 2018 XMRig: Father Zeus of Cryptocurrency Mining Malware? 5 min read - XMRig is popular among cybercriminals because it is open source, meaning threat actors can make relatively simple changes to its code to convert the tool into a cryptojacking mechanism.
Threat Intelligence February 21, 2018 IBM X-Force IRIS Uncovers Active Business Email Compromise Campaign Targeting Fortune 500 Companies 8 min read - IBM X-Force IRIS observed a widespread business email compromise (BEC) campaign targeting many Fortune 500 companies that exploits flaws in common accounts payable processes.
CISO February 20, 2018 The Journey to Security and Cyber Resiliency 3 min read - At Think 2018, attendees will learn how an integrated approach to security and resiliency can help them prevent cyberattacks and effectively respond to the ones that slip through their defenses.
Malware February 12, 2018 Necurs Spammers Go All In to Find a Valentine’s Day Victim 4 min read - The cybergang behind the Necurs botnet launched a massive romance-themed spam campaign in the lead up to Valentine's Day, impersonating single Russian women looking for dates online.
Risk Management February 6, 2018 January’s Top Cybersecurity News Stories: Jackpotting, Cryptocurrency Mining and Other Emerging Trends 4 min read - The start of February is a great time for organizations and individuals to sweep away the confetti and dig into the most significant cybersecurity news stories from the past month.
February 5, 2018 Are You Affected by the Next Zero-Day? 4 min read - With the new Am I Affected button, IBM QRadar users are quickly notified of any indicators of a zero-day vulnerability captured within X-Force Exchange collections.
Threat Intelligence January 30, 2018 No Rest for the Weary: Applying Security Lessons From 2017 in the New Year 2 min read - Organizations around the world should take stock of the security lessons they learned in 2017 to set realistic, achievable goals for the new year.
Advanced Threats January 3, 2018 CPU Vulnerability Can Allow Attackers to Read Privileged Kernel Memory and Leak Data 6 min read - A newly discovered hardware vulnerability underscores a microprocessor flaw that could allow an attacker to read data from privileged kernel memory.
Network December 21, 2017 BGP Internet Routing: What Are the Threats? 5 min read - The rate of BGP internet routing attacks has not increased significantly in the past two years. It is a considerable threat, however, because it puts the stability of the internet at risk.