How Cybersecurity Threat Intelligence Teams Spot Attacks Before They Start

A thorough cybersecurity threat intelligence team can turn a threat into a tool for future protection. Their job is to conduct background research on threat groups’ motivations and capabilities. This way, the intelligence team can be ready to protect an organization with even greater knowledge in the future. Strong cybersecurity threat intelligence about who attackers […]

The post How Cybersecurity Threat Intelligence Teams Spot Attacks Before They Start appeared first on Security Intelligence.

Continue reading How Cybersecurity Threat Intelligence Teams Spot Attacks Before They Start

Ransomware 2020: Attack Trends Affecting Organizations Worldwide

Ransomware is one of the most intractable — and common — threats facing organizations across all industries and geographies. And, incidents of ransomware attacks continue to rise. Meanwhile, ransomware threat actors are adjusting their attack model to adapt to improvements that organizations are making to recover from these attacks. As of September 2020, one in […]

The post Ransomware 2020: Attack Trends Affecting Organizations Worldwide appeared first on Security Intelligence.

Continue reading Ransomware 2020: Attack Trends Affecting Organizations Worldwide

Multifactor Authentication: The Next Battleground

X-Force Incident Response and Intelligence Services (IRIS) has responded to multiple security incidents where multifactor authentication (MFA) was not implemented—but where implementing MFA might have significantly reduced the impact of the incident. Such incidents have even included destructive malware attacks, resulting in millions of dollars in losses and the irreversible destruction of thousands of machines on the network. […]

The post Multifactor Authentication: The Next Battleground appeared first on Security Intelligence.

Continue reading Multifactor Authentication: The Next Battleground

State of the Phish: IBM X-Force Reveals Current Phishing Attack Trends

Phishing has long been an infection vector of choice for threat actors, and for good reason — it is relatively easy, inexpensive and consistently successful.

The post State of the Phish: IBM X-Force Reveals Current Phishing Attack Trends appeared first on Security Intelligence.

Continue reading State of the Phish: IBM X-Force Reveals Current Phishing Attack Trends

From State-Sponsored Attackers to Common Cybercriminals: Destructive Attacks on the Rise

Reading Time: 4 minutes Destructive attacks have been on the rise, posing a growing threat to a wide variety of businesses who may not consider themselves an obvious target of cybercriminals.

The post From State-Sponsored Attackers to Common Cybercriminals: Destructive Attacks on the Rise appeared first on Security Intelligence.

Continue reading From State-Sponsored Attackers to Common Cybercriminals: Destructive Attacks on the Rise

The Decline of Hacktivism: Attacks Drop 95 Percent Since 2015

Despite the rise in vulnerability reporting, cryptojacking attacks and attacks on critical infrastructure, one threat trend has been on the decline.

The post The Decline of Hacktivism: Attacks Drop 95 Percent Since 2015 appeared first on Security Intelligence.

Continue reading The Decline of Hacktivism: Attacks Drop 95 Percent Since 2015

An Increase in PowerShell Attacks: Observations From IBM X-Force IRIS

Since the open source release of the PowerShell framework in 2016, IBM X-Force Incident Response and Intelligence Services (IRIS) has identified an upward trend in malicious PowerShell use.

The post An Increase in PowerShell Attacks: Observations From IBM X-Force IRIS appeared first on Security Intelligence.

Continue reading An Increase in PowerShell Attacks: Observations From IBM X-Force IRIS

Cybersecurity at the World Cup: What You Should Know

Global sporting events require heightened cybersecurity because of the expanded digitization of sports venues.

The post Cybersecurity at the World Cup: What You Should Know appeared first on Security Intelligence.

Continue reading Cybersecurity at the World Cup: What You Should Know