Staying Vigilant About Retail Security Does Not End on Black Friday

As one of the most targeted industries, retailers should be taking measures to build a secure infrastructure ahead of the holidays and keep retail security evolving and maturing all year long.

The post Staying Vigilant About Retail Security Does Not End on Black Friday appeared first on Security Intelligence.

Continue reading Staying Vigilant About Retail Security Does Not End on Black Friday

Public Sector Security Is Lagging — How Can States and Governments Better Defend Against Cyberattacks in 2020?

Malicious cyberattacks against the public sector have made headlines for the past five years, but although the stakes are high, the response from government agencies has not always been adequate.

The post Public Sector Security Is Lagging — How Can States and Governments Better Defend Against Cyberattacks in 2020? appeared first on Security Intelligence.

Continue reading Public Sector Security Is Lagging — How Can States and Governments Better Defend Against Cyberattacks in 2020?

New Destructive Wiper ZeroCleare Targets Energy Sector in the Middle East

According to IBM X-Force research, the ZeroCleare wiper was used to execute a destructive attack that affected organizations in the energy and industrial sectors in the Middle East.

The post New Destructive Wiper ZeroCleare Targets Energy Sector in the Middle East appeared first on Security Intelligence.

Continue reading New Destructive Wiper ZeroCleare Targets Energy Sector in the Middle East

The Day MegaCortex Ransomware Mayhem Was Averted

IBM X-Force IRIS investigated a recent MegaCortex ransomware attack that highlights the benefits of reporting early and escalating suspicious indicators to responders.

The post The Day MegaCortex Ransomware Mayhem Was Averted appeared first on Security Intelligence.

Continue reading The Day MegaCortex Ransomware Mayhem Was Averted

Clone or Swap? SIM Card Vulnerabilities to Reckon With

SIM card vulnerabilities leave organizations exposed to SIM swapping and SIM cloning attacks. IBM X-Force findings from dark web analysis suggest these threats are not slowing down anytime soon.

The post Clone or Swap? SIM Card Vulnerabilities to Reckon With appeared first on Security Intelligence.

Continue reading Clone or Swap? SIM Card Vulnerabilities to Reckon With

Why Cities Shouldn’t Pay Ransomware Criminals

Recent ransomware attacks on U.S. cities have revealed the exorbitant cost of recovering from a data breach. However, paying the ransom only empowers cybercriminals to continue their campaigns.

The post Why Cities Shouldn’t Pay Ransomware Criminals appeared first on Security Intelligence.

Continue reading Why Cities Shouldn’t Pay Ransomware Criminals

Sound Advice: Our 2019 International Podcast Day Roundup

Sept. 30 is International Podcast Day. Here’s a roundup of this year’s most interesting and insightful SecurityIntelligence podcasts.

The post Sound Advice: Our 2019 International Podcast Day Roundup appeared first on Security Intelligence.

Continue reading Sound Advice: Our 2019 International Podcast Day Roundup

Leading Magecart Group Targeting Captive Wi-Fi Users via L7 Routers

According to IBM X-Force IRIS, Magecart Group 5 is likely testing malicious code designed for injection into benign JavaScript files loaded by commercial-grade L7 routers.

The post Leading Magecart Group Targeting Captive Wi-Fi Users via L7 Routers appeared first on Security Intelligence.

Continue reading Leading Magecart Group Targeting Captive Wi-Fi Users via L7 Routers

More_eggs, Anyone? Threat Actor ITG08 Strikes Again

Reading Time: 14 minutes X-Force IRIS observed ITG08, which has historically targeted POS machines in the retail and hospitality sectors, injecting malicious code into online checkout pages to steal payment card data.

The post More_eggs, Anyone? Threat Actor ITG08 Strikes Again appeared first on Security Intelligence.

Continue reading More_eggs, Anyone? Threat Actor ITG08 Strikes Again

How IBM X-Force IRIS Prepared for the Ukraine Election

More than a month before the first round of the Ukraine election in March, we decided that we couldn’t afford to sit on our heels until an attack was launched.

The post How IBM X-Force IRIS Prepared for the Ukraine Election appeared first on Security Intelligence.

Continue reading How IBM X-Force IRIS Prepared for the Ukraine Election