Security Interns Help to Create a Global IBM Hacking Competition

A group of interns collaborated with experts on the IBM Managed Security Services team to create a global IBM hacking competition.

The post Security Interns Help to Create a Global IBM Hacking Competition appeared first on Security Intelligence.

Continue reading Security Interns Help to Create a Global IBM Hacking Competition

VBA Macro Malware Jumping on the Ransomware Bandwagon

IBM observed a spike in malware activity that uses Visual Basic for Applications (VBA) macros to deliver malicious attachments.

The post VBA Macro Malware Jumping on the Ransomware Bandwagon appeared first on Security Intelligence.

Continue reading VBA Macro Malware Jumping on the Ransomware Bandwagon

VBA Macro Malware Jumping on the Ransomware Bandwagon

IBM observed a spike in malware activity that uses Visual Basic for Applications (VBA) macros to deliver malicious attachments.

The post VBA Macro Malware Jumping on the Ransomware Bandwagon appeared first on Security Intelligence.

Continue reading VBA Macro Malware Jumping on the Ransomware Bandwagon

IBM Named a Leader in 2016 Forrester Wave for Managed Security Services

IBM Security is among those that lead the pack in a recent assessment of 11 providers in “The Forrester Wave for Managed Security Services, Q3 2016.”

The post IBM Named a Leader in 2016 Forrester Wave for Managed Security Services appeared first on Security Intelligence.

Continue reading IBM Named a Leader in 2016 Forrester Wave for Managed Security Services

Managed SIEM: The Digital Detective Helping to Fight Cybercrime

As the cyberthreat landscape continues to evolve, many companies are turning to managed SIEM systems to analyze and respond to potential security threats.

The post Managed SIEM: The Digital Detective Helping to Fight Cybercrime appeared first on Security Intelligence.

Continue reading Managed SIEM: The Digital Detective Helping to Fight Cybercrime

Command Injection: A Deadly Needle in the Haystack

Command injection attacks may not get a lot of hype, but they can be seriously damaging to an enterprise that isn’t careful about its security.

The post Command Injection: A Deadly Needle in the Haystack appeared first on Security Intelligence.

Continue reading Command Injection: A Deadly Needle in the Haystack

The Webshell Game Continues

IBM X-Force researchers have noted a dramatic increase in the use of malicious webshell attacks throughout the first half of 2016.

The post The Webshell Game Continues appeared first on Security Intelligence.

Continue reading The Webshell Game Continues

Telnet: An Attacker’s Gateway to the IoT

Savvy cybercriminals are using older technologies such as Telnet to carry out attacks on IoT devices, a recent IBM Security report discovered.

The post Telnet: An Attacker’s Gateway to the IoT appeared first on Security Intelligence.

Continue reading Telnet: An Attacker’s Gateway to the IoT

Footprinting and Brute-Force Attacks Remain Prevalent

With so much attention focused on APTs and mutating malware, it’s easy to overlook brute-force attacks — which can still be successful.

The post Footprinting and Brute-Force Attacks Remain Prevalent appeared first on Security Intelligence.

Continue reading Footprinting and Brute-Force Attacks Remain Prevalent