Threat Intelligence: A Tear-Free Solution to Help SOC Analysis Prepare for the Next WannaCry

An effective threat intelligence solution enables analysts to address, track and investigate advanced attacks such as WannaCry ransomware.

The post Threat Intelligence: A Tear-Free Solution to Help SOC Analysis Prepare for the Next WannaCry appeared first on Security Intelligence.

Continue reading Threat Intelligence: A Tear-Free Solution to Help SOC Analysis Prepare for the Next WannaCry

Diving Into Zberp’s Unconventional Process Injection Technique

IBM X-Force Research discovered a new variant of Zberp that evades API threat detection tools using a code injection technique it borrowed from Carberp.

The post Diving Into Zberp’s Unconventional Process Injection Technique appeared first on Security Intelligence.

Continue reading Diving Into Zberp’s Unconventional Process Injection Technique

Diving Into Zberp’s Unconventional Process Injection Technique

IBM X-Force Research discovered a new variant of Zberp that evades API threat detection tools using a code injection technique it borrowed from Carberp.

The post Diving Into Zberp’s Unconventional Process Injection Technique appeared first on Security Intelligence.

Continue reading Diving Into Zberp’s Unconventional Process Injection Technique

TrickBot Takes to Latin America, Continues to Expand Its Global Reach

The cybergang operating the TrickBot banking Trojan were unusually active over the summer, launching new campaigns in Latin America and updating its code.

The post TrickBot Takes to Latin America, Continues to Expand Its Global Reach appeared first on Security Intelligence.

Continue reading TrickBot Takes to Latin America, Continues to Expand Its Global Reach

Cybercrime’s Cryptocurrency Gold Rush: Going Strong!

Cryptocurrencies such as bitcoin are becoming more popular, but that means cybercriminals are embracing the potential of cryptocurrency as well.

The post Cybercrime’s Cryptocurrency Gold Rush: Going Strong! appeared first on Security Intelligence.

Continue reading Cybercrime’s Cryptocurrency Gold Rush: Going Strong!

Leaking Cloud Databases and Servers Expose Over 1 Billion Records

According to IBM X-Force, misconfigured cloud databases accounted for more than 71 percent of reported leaked records so far in 2017.

The post Leaking Cloud Databases and Servers Expose Over 1 Billion Records appeared first on Security Intelligence.

Continue reading Leaking Cloud Databases and Servers Expose Over 1 Billion Records

Network Attacks Containing Cryptocurrency CPU Mining Tools Grow Sixfold

IBM Managed Security Services (MSS) detected a sixfold increase in attacks involving embedded CPU mining tools between January and August 2017.

The post Network Attacks Containing Cryptocurrency CPU Mining Tools Grow Sixfold appeared first on Security Intelligence.

Continue reading Network Attacks Containing Cryptocurrency CPU Mining Tools Grow Sixfold

Downward Trend in Publicly Available Exploit Code? Don’t Ease Up on Patch Management Just Yet

IBM X-Force reported a downward trend in publicly available exploit code, but security teams must still prioritize vulnerability and patch management.

The post Downward Trend in Publicly Available Exploit Code? Don’t Ease Up on Patch Management Just Yet appeared first on Security Intelligence.

Continue reading Downward Trend in Publicly Available Exploit Code? Don’t Ease Up on Patch Management Just Yet

Brazilian Malware Client Maximus: Maximizing the Mayhem

A new, upgraded version of remote access malware Client Maximus points to the growing sophistication of cybercriminals in Brazil.

The post Brazilian Malware Client Maximus: Maximizing the Mayhem appeared first on Security Intelligence.

Continue reading Brazilian Malware Client Maximus: Maximizing the Mayhem

Spotlight on Energy and Utilities Sector: Attacks Targeting ICS Systems Projected to Increase

According to IBM X-Force data, cybercriminals have been targeting industrial control systems in the energy and utilities sector at an increasing rate.

The post Spotlight on Energy and Utilities Sector: Attacks Targeting ICS Systems Projected to Increase appeared first on Security Intelligence.

Continue reading Spotlight on Energy and Utilities Sector: Attacks Targeting ICS Systems Projected to Increase