New Banking Trojan MnuBot Discovered by IBM X Force Research

IBM X-Force Research has uncovered a new Brazilian, Delphi-based malware active in the wild in a recent campaign dubbed MnuBot.

The post New Banking Trojan MnuBot Discovered by IBM X Force Research appeared first on Security Intelligence.

Continue reading New Banking Trojan MnuBot Discovered by IBM X Force Research

WHOIS Behind Cyberattacks? Under GDPR, We May Not Know

The goal of the European Union’s General Data Protection Regulation (GDPR) is, among other things, to standardize data protection laws applicable to EU data subjects. Aimed at enhancing privacy protection, the enforcement of the regulation becomes effective on May 25. GDPR’s implementation on an issue relevant to the cybersecurity industry may well have negative consequences […]

The post WHOIS Behind Cyberattacks? Under GDPR, We May Not Know appeared first on Security Intelligence.

Continue reading WHOIS Behind Cyberattacks? Under GDPR, We May Not Know

Q1 2018 Results: Gozi (Ursnif) Takes Larger Piece of the Pie and Distributes IcedID

Gozi took a larger slice of the financial malware pie and become the most active banking Trojan in 2017, according to the IBM X-Force Threat Intelligence Index 2018.

The post Q1 2018 Results: Gozi (Ursnif) Takes Larger Piece of the Pie and Distributes IcedID appeared first on Security Intelligence.

Continue reading Q1 2018 Results: Gozi (Ursnif) Takes Larger Piece of the Pie and Distributes IcedID

2018 IBM X Force Report: Shellshock Fades, Gozi Rises and Insider Threats Soar

The latest IBM X-Force report highlighted threats stemming from misconfigured cloud servers and inadvertent insider negligence and examined malware trends from 2017 that could continue into 2018.

The post 2018 IBM X Force Report: Shellshock Fades, Gozi Rises and Insider Threats Soar appeared first on Security Intelligence.

Continue reading 2018 IBM X Force Report: Shellshock Fades, Gozi Rises and Insider Threats Soar

XMRig: Father Zeus of Cryptocurrency Mining Malware?

XMRig is popular among cybercriminals because it is open source, meaning threat actors can make relatively simple changes to its code to convert the tool into a cryptojacking mechanism.

The post XMRig: Father Zeus of Cryptocurrency Mining Malware? appeared first on Security Intelligence.

Continue reading XMRig: Father Zeus of Cryptocurrency Mining Malware?

IBM X-Force IRIS Uncovers Active Business Email Compromise Campaign Targeting Fortune 500 Companies

IBM X-Force IRIS observed a widespread business email compromise (BEC) campaign targeting many Fortune 500 companies that exploits flaws in common accounts payable processes.

The post IBM X-Force IRIS Uncovers Active Business Email Compromise Campaign Targeting Fortune 500 Companies appeared first on Security Intelligence.

Continue reading IBM X-Force IRIS Uncovers Active Business Email Compromise Campaign Targeting Fortune 500 Companies

Necurs Spammers Go All In to Find a Valentine’s Day Victim

The cybergang behind the Necurs botnet launched a massive romance-themed spam campaign in the lead up to Valentine’s Day, impersonating single Russian women looking for dates online.

The post Necurs Spammers Go All In to Find a Valentine’s Day Victim appeared first on Security Intelligence.

Continue reading Necurs Spammers Go All In to Find a Valentine’s Day Victim

January’s Top Cybersecurity News Stories: Jackpotting, Cryptocurrency Mining and Other Emerging Trends

The start of February is a great time for organizations and individuals to sweep away the confetti and dig into the most significant cybersecurity news stories from the past month.

The post January’s Top Cybersecurity News Stories: Jackpotting, Cryptocurrency Mining and Other Emerging Trends appeared first on Security Intelligence.

Continue reading January’s Top Cybersecurity News Stories: Jackpotting, Cryptocurrency Mining and Other Emerging Trends

No Rest for the Weary: Applying Security Lessons From 2017 in the New Year

How can it be that we are already through January and moving into February of the new year? I don’t know about you, but I still have a long list of resolutions to accomplish and I need to focus on what I can realistically get done in 2018. This makes me think about how everyone […]

The post No Rest for the Weary: Applying Security Lessons From 2017 in the New Year appeared first on Security Intelligence.

Continue reading No Rest for the Weary: Applying Security Lessons From 2017 in the New Year

Financial Malware Trends and Predictions: Organized Cybercrime Continues to Rise

As security tools improve, malicious actors are increasingly operating as organized cybergangs and less sophisticated actors are falling behind, according to X-Force analysis of malware trends.

The post Financial Malware Trends and Predictions: Organized Cybercrime Continues to Rise appeared first on Security Intelligence.

Continue reading Financial Malware Trends and Predictions: Organized Cybercrime Continues to Rise