The Necurs Botnet: A Pandora’s Box of Malicious Spam

Since its initial launch five years ago, the Necurs botnet has quickly ascended the cybercriminal ranks. Today, it controls more than 6 million endpoints.

The post The Necurs Botnet: A Pandora’s Box of Malicious Spam appeared first on Security Intelligence.

Continue reading The Necurs Botnet: A Pandora’s Box of Malicious Spam

Commercial Malware Makes a Comeback in 2016

According to the IBM X-Force Threat Intelligence Index for 2017, commercial malware made a notable comeback in 2016 and remains a top threat in 2017.

The post Commercial Malware Makes a Comeback in 2016 appeared first on Security Intelligence.

Continue reading Commercial Malware Makes a Comeback in 2016

The NukeBot Trojan, a Bruised Ego and a Surprising Source Code Leak

After being spurned by his cybercriminal peers on underground forums, the creator of NukeBot apparently leaked the banking Trojan’s source code.

The post The NukeBot Trojan, a Bruised Ego and a Surprising Source Code Leak appeared first on Security Intelligence.

Continue reading The NukeBot Trojan, a Bruised Ego and a Surprising Source Code Leak

The Changing Fintech Landscape in Asia-Pacific and Its Security Implications

The fintech marketis growing in the Asia-Pacific region, especially in China and India, due to increasing innovation and a strong startup culture.

The post The Changing Fintech Landscape in Asia-Pacific and Its Security Implications appeared first on Security Intelligence.

Continue reading The Changing Fintech Landscape in Asia-Pacific and Its Security Implications

Hey Phishing, You Old Foe — Catch This Cognitive Drift?

Powered by machine learning, IBM Trusteer can help IT professionals nip phishing attacks in the bud with unprecedented speed and accuracy.

The post Hey Phishing, You Old Foe — Catch This Cognitive Drift? appeared first on Security Intelligence.

Continue reading Hey Phishing, You Old Foe — Catch This Cognitive Drift?

Why Blockchain-as-a-Service Should Be on Your Radar

Blockchain-as-a-service could be the next big thing to hit enterprises. Learn about the best options and processes for getting started with this tech.

The post Why Blockchain-as-a-Service Should Be on Your Radar appeared first on Security Intelligence.

Continue reading Why Blockchain-as-a-Service Should Be on Your Radar

GootKit Developers Dress It Up With Web Traffic Proxy

X-Force researchers revealed the cybergang behind Gootkit had upgraded the banking Trojan with new network interception and certificate bypass methods.

The post GootKit Developers Dress It Up With Web Traffic Proxy appeared first on Security Intelligence.

Continue reading GootKit Developers Dress It Up With Web Traffic Proxy

GootKit Developers Dress It Up With Web Traffic Proxy

X-Force researchers revealed the cybergang behind Gootkit had upgraded the banking Trojan with new network interception and certificate bypass methods.

The post GootKit Developers Dress It Up With Web Traffic Proxy appeared first on Security Intelligence.

Continue reading GootKit Developers Dress It Up With Web Traffic Proxy

Dridex’s Cold War: Enter AtomBombing

IBM X-Force researchers discovered that an upgraded version of Dridex has been using a new injection method, signifying the Trojan’s continued evolution.

The post Dridex’s Cold War: Enter AtomBombing appeared first on Security Intelligence.

Continue reading Dridex’s Cold War: Enter AtomBombing

Govern Your API Banking Environment

As the financial services landscape increasingly shifts toward digital solutions, it is more crucial than ever to secure API banking environments.

The post Govern Your API Banking Environment appeared first on Security Intelligence.

Continue reading Govern Your API Banking Environment