Cyber Insurers Might Be Making the Ransomware Problem Worse

In mid-May, one of the largest insurance companies in the U.S. paid $40 million to ransomware attackers. Two people familiar with the matter told Bloomberg that the malicious actors stole an undisclosed quantity of data and then effectively locked the insurer out of its network for two weeks. The company ignored the attackers’ demands at […]

The post Cyber Insurers Might Be Making the Ransomware Problem Worse appeared first on Security Intelligence.

Continue reading Cyber Insurers Might Be Making the Ransomware Problem Worse

RoboSki and Global Recovery: Automation to Combat Evolving Obfuscation

In a recent collaboration to investigate a rise in malware infections featuring a commercial remote access trojan (RAT), IBM Security X-Force and Cipher Tech Solutions (CT), a defense and intelligence security firm, investigated malicious activity that spiked in the first quarter of 2021. With over 1,300 malware samples collected, the teams analyzed the delivery of […]

The post RoboSki and Global Recovery: Automation to Combat Evolving Obfuscation appeared first on Security Intelligence.

Continue reading RoboSki and Global Recovery: Automation to Combat Evolving Obfuscation

Attacks on Operational Technology From IBM X-Force and Dragos Data

Operational Technology Threats in 2021: Ransomware, Remote Access Trojans and Targeted Threat Groups Organizations with operational technology (OT) networks face many unique — and often complicated — considerations when it comes to cybersecurity threats. One of the main challenges facing the community is the convergence of an increasingly OT-aware and capable threat landscape with the […]

The post Attacks on Operational Technology From IBM X-Force and Dragos Data appeared first on Security Intelligence.

Continue reading Attacks on Operational Technology From IBM X-Force and Dragos Data

A Fly on ShellBot’s Wall: The Risk of Publicly Available Cryptocurrency Miners

IBM Security X-Force researchers studied the botnet activity of a malware variant that is used by cyber crime groups to illegally mine cryptocurrency. Examining two ShellBot botnets that appeared in attacks honeypots caught, the X-Force team was able to infect its own devices and become part of the live botnets, thereby gaining insight into how […]

The post A Fly on ShellBot’s Wall: The Risk of Publicly Available Cryptocurrency Miners appeared first on Security Intelligence.

Continue reading A Fly on ShellBot’s Wall: The Risk of Publicly Available Cryptocurrency Miners

Cloud Security: Navigating the Cloud Migration Journey Successfully

During the last decade, lots of business owners have talked about cloud migration and transformation, as well as cloud security. With Gartner’s most recent forecast of an 18.4% increase in worldwide public spending on cloud services in 2021, totaling almost $305 billion, it is clear this trend is only heading upward. But what are the […]

The post Cloud Security: Navigating the Cloud Migration Journey Successfully appeared first on Security Intelligence.

Continue reading Cloud Security: Navigating the Cloud Migration Journey Successfully

Cloud Security: Navigating the Cloud Migration Journey Successfully

During the last decade, lots of business owners have talked about cloud migration and transformation, as well as cloud security. With Gartner’s most recent forecast of an 18.4% increase in worldwide public spending on cloud services in 2021, totaling almost $305 billion, it is clear this trend is only heading upward. But what are the […]

The post Cloud Security: Navigating the Cloud Migration Journey Successfully appeared first on Security Intelligence.

Continue reading Cloud Security: Navigating the Cloud Migration Journey Successfully

Ursnif Leverages Cerberus to Automate Fraudulent Bank Transfers in Italy

Contributed to this research: Segev Fogel, Amir Gendler and Nethanella Messer.   IBM Trusteer researchers continually monitor the evolution and attack tactics in the banking sector. In a recent analysis, our team found that an Ursnif (aka Gozi) banking Trojan variant is being used in the wild to target online banking users in Italy with […]

The post Ursnif Leverages Cerberus to Automate Fraudulent Bank Transfers in Italy appeared first on Security Intelligence.

Continue reading Ursnif Leverages Cerberus to Automate Fraudulent Bank Transfers in Italy

Cyber Gangs: Who Are They in 2021 and What Do They Want?

Cyber crime gangs have been operating for years, but in recent months, they’ve shifted tactics. They’ve embraced new technologies, exploited new opportunities, delivered new payloads and sought out new targets. Their aim is to maximize the amount of money they can collect through cyber crime. Gangs, such as Cosmic Lynx, Exaggerated Lion, Fin7 and Florentine […]

The post Cyber Gangs: Who Are They in 2021 and What Do They Want? appeared first on Security Intelligence.

Continue reading Cyber Gangs: Who Are They in 2021 and What Do They Want?

3 Ransomware Threats in 2021 and How to Protect Against Them

I’m sure I’m not the only one who expected the world to magically get back to normal — whatever that is — when the ball dropped on 2021. After seeing a rise in threats last year, no more ransomware, or at least fewer attacks, was on my very long wish list for a wonderful new […]

The post 3 Ransomware Threats in 2021 and How to Protect Against Them appeared first on Security Intelligence.

Continue reading 3 Ransomware Threats in 2021 and How to Protect Against Them

Why You Need Attack Surface Management (And How To Achieve It)

Attack surface management (ASM) has rightly become a major priority for business leaders and digital defenders alike. The number of connected things is growing, and that means attackers have far more entryways into your networks and systems. With ASM, you can respond proactively to threats to stop them before they start. What is ASM?  So, […]

The post Why You Need Attack Surface Management (And How To Achieve It) appeared first on Security Intelligence.

Continue reading Why You Need Attack Surface Management (And How To Achieve It)