Data Breach Costs at Record High, Zero Trust, AI and Automation Help Reduce Costs

Data breaches have been growing in numbers and scale, taking longer to detect and contain. The average total cost of a data breach is at its highest of 17 years, at $4.24 million. The year over year increase of 10% is the largest single year cost increase recorded in the last 7 years. IBM and […]

The post Data Breach Costs at Record High, Zero Trust, AI and Automation Help Reduce Costs appeared first on Security Intelligence.

Continue reading Data Breach Costs at Record High, Zero Trust, AI and Automation Help Reduce Costs

What’s New in the 2021 Cost of a Data Breach Report

Has cybersecurity ever been more important than it is right now? Even in these extraordinary times, with its focus on manufacturing vaccines and getting shots into arms, new research in the Cost of a Data Breach Report shows that the increasing cost of security breaches makes preventing and responding to these threats a critical concern. […]

The post What’s New in the 2021 Cost of a Data Breach Report appeared first on Security Intelligence.

Continue reading What’s New in the 2021 Cost of a Data Breach Report

This Chat is Being Recorded: Egregor Ransomware Negotiations Uncovered

Ransomware attacks are topping the charts as the most common attack type to target organizations with a constant drumbeat of attacks impacting industries across the board. In fact, IBM Security X-Force has seen a more than 10% increase in ransomware incident response requests compared to this time last year. Ransomware is well on its way […]

The post This Chat is Being Recorded: Egregor Ransomware Negotiations Uncovered appeared first on Security Intelligence.

Continue reading This Chat is Being Recorded: Egregor Ransomware Negotiations Uncovered

RoboSki and Global Recovery: Automation to Combat Evolving Obfuscation

In a recent collaboration to investigate a rise in malware infections featuring a commercial remote access trojan (RAT), IBM Security X-Force and Cipher Tech Solutions (CT), a defense and intelligence security firm, investigated malicious activity that spiked in the first quarter of 2021. With over 1,300 malware samples collected, the teams analyzed the delivery of […]

The post RoboSki and Global Recovery: Automation to Combat Evolving Obfuscation appeared first on Security Intelligence.

Continue reading RoboSki and Global Recovery: Automation to Combat Evolving Obfuscation

REvil Ransomware Gang Launches Major Supply Chain Attack Through Kaseya, Downstream Impact May Affect Over 1,500 Customers

On July 2, 2021, Kaseya customers were notified of a compromise affecting the company’s VSA product in a way that poisoned the product’s update mechanism with malicious code. VSA is a remote monitoring and management tool for networks and endpoints intended for use by enterprise customers and managed service providers (MSPs). According to Kaseya, it […]

The post REvil Ransomware Gang Launches Major Supply Chain Attack Through Kaseya, Downstream Impact May Affect Over 1,500 Customers appeared first on Security Intelligence.

Continue reading REvil Ransomware Gang Launches Major Supply Chain Attack Through Kaseya, Downstream Impact May Affect Over 1,500 Customers

Attacks on Operational Technology From IBM X-Force and Dragos Data

Operational Technology Threats in 2021: Ransomware, Remote Access Trojans and Targeted Threat Groups Organizations with operational technology (OT) networks face many unique — and often complicated — considerations when it comes to cybersecurity threats. One of the main challenges facing the community is the convergence of an increasingly OT-aware and capable threat landscape with the […]

The post Attacks on Operational Technology From IBM X-Force and Dragos Data appeared first on Security Intelligence.

Continue reading Attacks on Operational Technology From IBM X-Force and Dragos Data

Hunting for Windows “Features” with Frida: DLL Sideloading

Offensive security professionals have been using Frida for analyzing iOS and Android mobile applications. However, there has been minimal usage of Frida for desktop operating systems such as Windows. Frida is described by the author as a “Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.” From a security research and adversarial simulation perspective, Frida […]

The post Hunting for Windows “Features” with Frida: DLL Sideloading appeared first on Security Intelligence.

Continue reading Hunting for Windows “Features” with Frida: DLL Sideloading

A Fly on ShellBot’s Wall: The Risk of Publicly Available Cryptocurrency Miners

IBM Security X-Force researchers studied the botnet activity of a malware variant that is used by cyber crime groups to illegally mine cryptocurrency. Examining two ShellBot botnets that appeared in attacks honeypots caught, the X-Force team was able to infect its own devices and become part of the live botnets, thereby gaining insight into how […]

The post A Fly on ShellBot’s Wall: The Risk of Publicly Available Cryptocurrency Miners appeared first on Security Intelligence.

Continue reading A Fly on ShellBot’s Wall: The Risk of Publicly Available Cryptocurrency Miners

Ursnif Leverages Cerberus to Automate Fraudulent Bank Transfers in Italy

Contributed to this research: Segev Fogel, Amir Gendler and Nethanella Messer.   IBM Trusteer researchers continually monitor the evolution and attack tactics in the banking sector. In a recent analysis, our team found that an Ursnif (aka Gozi) banking Trojan variant is being used in the wild to target online banking users in Italy with […]

The post Ursnif Leverages Cerberus to Automate Fraudulent Bank Transfers in Italy appeared first on Security Intelligence.

Continue reading Ursnif Leverages Cerberus to Automate Fraudulent Bank Transfers in Italy

How One Application Test Uncovered an Unexpected Opening in an Enterprise Call Tool

Working as security consultants is highly rewarding. Companies depend on us to view their environment from the perspective of an attacker and find vulnerabilities that could enable threats to succeed. One of the most impactful parts of our role is when we’re the first to find a major vulnerability that could lead to a widespread […]

The post How One Application Test Uncovered an Unexpected Opening in an Enterprise Call Tool appeared first on Security Intelligence.

Continue reading How One Application Test Uncovered an Unexpected Opening in an Enterprise Call Tool