Intelligence & Analytics November 19, 2015 Security: It’s Better When Done Together 2 min read - IBM's X-Force Exchange encourages security professionals to share threat intelligence information, which in turn helps the entire industry advance.
X-Force November 17, 2015 A Look Back With IBM X-Force: Lessons Learned From Security Research in 2015 2 min read - The latest 2015 IBM X-Force Threat Intelligence Quarterly focuses on the lessons learned from security research throughout the year.
CISO November 13, 2015 Security On Demand: From Endpoint to Mainframe, Passing Through the Cloud 2 min read - There are many security tools available to enterprises today, and the current threat landscape is forcing providers to alter their offerings.
Threat Intelligence October 7, 2015 Comparing Different Tools for Threat Sharing 4 min read - Threat sharing is getting more and more attention from security professionals to detect and quickly respond to security threats.
Malware October 2, 2015 UK Banks Hit With New Zeus Sphinx Variant and Renewed Kronos Banking Trojan Attacks 6 min read - IBM Security X-Force researchers have discovered instances of the Kronos banking Trojan and Zeus Sphinx malware being used by cybercriminals in the wild.
Malware September 28, 2015 Shifu Officially Spreads to the UK: Banks and Wealth Management Firms Beware 2 min read - The Shifu banking Trojan has gone through yet another rejuvenation, this time transforming to target banks and wealth management firms in the U.K.
Intelligence & Analytics September 16, 2015 Forecasting a Breach Is Like Finding a Needle in a Haystack — Not That Tough 5 min read - Forecasting a data breach doesn't have to be difficult. With the help of threat intelligence and collaboration, organizations can spot vulnerabilities.
Malware September 10, 2015 An Overnight Sensation — CoreBot Returns as a Full-Fledged Financial Malware 6 min read - CoreBot's developers have evolved the malware into a full-fledged banking Trojan that executes a variety of attacks to steal victims' bank credentials.
Threat Intelligence September 9, 2015 Certificates-as-a-Service? Code Signing Certs Become Popular Cybercrime Commodity 10 min read - IBM Security X-Force researchers recently uncovered a new trend dominating the cybercrime underground: the sale of stolen or fraudulent certificates.
Software Vulnerabilities September 8, 2015 Markdown: Designer Vulnerabilities Get a Fresh CVSS v3 Look 3 min read - The Common Vulnerability Scoring System (CVSS) has been completely redone to more accurately reflect the scope and impact of vulnerabilities.