X-Force Report: No Shortage of Resources Aimed at Hacking Cloud Environments

As cybercriminals remain steadfast in their pursuit of unsuspecting ways to infiltrate today’s businesses, a new report by IBM Security X-Force highlights the top tactics of cybercriminals, the open doors users are leaving for them and the burgeoning marketplace for stolen cloud resources on the dark web. The big takeaway from the data is businesses […]

The post X-Force Report: No Shortage of Resources Aimed at Hacking Cloud Environments appeared first on Security Intelligence.

Continue reading X-Force Report: No Shortage of Resources Aimed at Hacking Cloud Environments

3 Biggest Factors in Data Breach Costs and How To Reduce Them

The cost of a data breach has increased slightly in the last six years on average. Costs are up 10% since 2014 to $3.86 million, according to the annual Cost of a Data Breach Report, published by IBM Security and based on research conducted by the Ponemon Institute. Three areas in particular proved to have […]

The post 3 Biggest Factors in Data Breach Costs and How To Reduce Them appeared first on Security Intelligence.

Continue reading 3 Biggest Factors in Data Breach Costs and How To Reduce Them

A New Botnet Attack Just Mozied Into Town

A relatively new player in the threat arena, the Mozi botnet, has spiked among Internet of things (IoT) devices, IBM X-Force has discovered. This malware has been active since late 2019 and has code overlap with Mirai and its variants. Mozi accounted for nearly 90% of the observed IoT network traffic from October 2019 through […]

The post A New Botnet Attack Just Mozied Into Town appeared first on Security Intelligence.

Continue reading A New Botnet Attack Just Mozied Into Town

How Threat Actors Are Adapting to the Cloud

With organizations increasingly moving to cloud environments, cloud security is more critical than ever. Cloud environments often hold large troves of valuable and sensitive data that can put organizations and their customers at risk if they are breached. At the same time, many organizations are still discovering best practices surrounding cloud security and incident response. […]

The post How Threat Actors Are Adapting to the Cloud appeared first on Security Intelligence.

Continue reading How Threat Actors Are Adapting to the Cloud

What’s Old Is New, What’s New Is Old: Aged Vulnerabilities Still in Use in Attacks Today

Two vulnerabilities that were reported and patched in 2017 were used in nearly 90 percent of malspam messages in 2019. Why would threat actors use these old, well-known exploits in their attacks?

The post What’s Old Is New, What’s New Is Old: Aged Vulnerabilities Still in Use in Attacks Today appeared first on Security Intelligence.

Continue reading What’s Old Is New, What’s New Is Old: Aged Vulnerabilities Still in Use in Attacks Today

The Dark Web Market Is Moving Toward IaaS and MaaS — Here’s Why

The dark web market is shifting from commodities to cybercrime services such as infrastructure-as-a-service (IaaS) and malware-as-a-service (MaaS), creating benefits and challenges for security teams.

The post The Dark Web Market Is Moving Toward IaaS and MaaS — Here’s Why appeared first on Security Intelligence.

Continue reading The Dark Web Market Is Moving Toward IaaS and MaaS — Here’s Why

I Can’t Believe Mirais: Tracking the Infamous IoT Malware

Mirai malware is often perceived as a low-risk threat to enterprise security, but consumer devices in the home, when connected to corporate networks, can expose corporate networks to botnet attacks.

The post I Can’t Believe Mirais: Tracking the Infamous IoT Malware appeared first on Security Intelligence.

Continue reading I Can’t Believe Mirais: Tracking the Infamous IoT Malware

Cryptojacking Attacks: Who’s Mining on Your Coin?

X-Force data revealed that while browser-based cryptojacking was increasingly popular through most of 2018, cryptomining malware made a resurgence at the end of 2018 and into Q1 2019.

The post Cryptojacking Attacks: Who’s Mining on Your Coin? appeared first on Security Intelligence.

Continue reading Cryptojacking Attacks: Who’s Mining on Your Coin?

Spectre, Meltdown and More: What You Need to Know About Hardware Vulnerabilities

According to IBM X-Force IRIS research, threat actors will continue to search for ways to leverage Spectre, Meltdown and other hardware vulnerabilities to steal data in the coming years.

The post Spectre, Meltdown and More: What You Need to Know About Hardware Vulnerabilities appeared first on Security Intelligence.

Continue reading Spectre, Meltdown and More: What You Need to Know About Hardware Vulnerabilities