New Quad9 DNS Service Makes the Internet Safer and More Private

Quad9 goes far beyond standard DNS name resolution to improve privacy, security scalability and ease of use.

The post New Quad9 DNS Service Makes the Internet Safer and More Private appeared first on Security Intelligence.

Continue reading New Quad9 DNS Service Makes the Internet Safer and More Private

New Banking Trojan IcedID Discovered by IBM X-Force Research

IBM X-Force identified a new Trojan, dubbed IcedID, that uses advanced browser manipulation tactics to target financial institutions in the U.S. and U.K.

The post New Banking Trojan IcedID Discovered by IBM X-Force Research appeared first on Security Intelligence.

Continue reading New Banking Trojan IcedID Discovered by IBM X-Force Research

Threat Intelligence: A Tear-Free Solution to Help SOC Analysis Prepare for the Next WannaCry

An effective threat intelligence solution enables analysts to address, track and investigate advanced attacks such as WannaCry ransomware.

The post Threat Intelligence: A Tear-Free Solution to Help SOC Analysis Prepare for the Next WannaCry appeared first on Security Intelligence.

Continue reading Threat Intelligence: A Tear-Free Solution to Help SOC Analysis Prepare for the Next WannaCry

TrickBot Takes to Latin America, Continues to Expand Its Global Reach

The cybergang operating the TrickBot banking Trojan were unusually active over the summer, launching new campaigns in Latin America and updating its code.

The post TrickBot Takes to Latin America, Continues to Expand Its Global Reach appeared first on Security Intelligence.

Continue reading TrickBot Takes to Latin America, Continues to Expand Its Global Reach

Put Threat Intelligence Into Action With Security Apps

An update to IBM X-Force Exchange provides recommended apps to help users implement threat intelligence into their end-to-end security portfolio.

The post Put Threat Intelligence Into Action With Security Apps appeared first on Security Intelligence.

Continue reading Put Threat Intelligence Into Action With Security Apps

What Do Avocados and Threat Intelligence Have in Common?

Like a delicious guacamole, security teams need a perfect mix of IP addresses, MD5 checksum hashes and other threat intelligence to protect their networks.

The post What Do Avocados and Threat Intelligence Have in Common? appeared first on Security Intelligence.

Continue reading What Do Avocados and Threat Intelligence Have in Common?

Stay Up to Date on Threat Intelligence With New X-Force Exchange Capabilities

The IBM X-Force Exchange features new capabilities and notifications to help security analysts collaborate and share threat intelligence more efficiently.

The post Stay Up to Date on Threat Intelligence With New X-Force Exchange Capabilities appeared first on Security Intelligence.

Continue reading Stay Up to Date on Threat Intelligence With New X-Force Exchange Capabilities

Where Are They Today? Cybercrime Trojans That No One Misses: Shifu Malware

Before it started fading out in June 2016, Shifu malware appeared to be targeting banks in Japan and the U.K. and evolving at a steady pace.

The post Where Are They Today? Cybercrime Trojans That No One Misses: Shifu Malware appeared first on Security Intelligence.

Continue reading Where Are They Today? Cybercrime Trojans That No One Misses: Shifu Malware

Where Are They Today? Cybercrime Trojans That No One Misses: Shifu Malware

Before it started fading out in June 2016, Shifu malware appeared to be targeting banks in Japan and the U.K. and evolving at a steady pace.

The post Where Are They Today? Cybercrime Trojans That No One Misses: Shifu Malware appeared first on Security Intelligence.

Continue reading Where Are They Today? Cybercrime Trojans That No One Misses: Shifu Malware