An Increase in PowerShell Attacks: Observations From IBM X-Force IRIS

Since the open source release of the PowerShell framework in 2016, IBM X-Force Incident Response and Intelligence Services (IRIS) has identified an upward trend in malicious PowerShell use.

The post An Increase in PowerShell Attacks: Observations From IBM X-Force IRIS appeared first on Security Intelligence.

Continue reading An Increase in PowerShell Attacks: Observations From IBM X-Force IRIS

Enterprise Security Lessons From the Crypto-Mining Craze

Recent research has failed to pin down exactly how the current crypto-mining craze is trending, but companies can derive many key enterprise security lessons from the latest headline-grabbing threat.

The post Enterprise Security Lessons From the Crypto-Mining Craze appeared first on Security Intelligence.

Continue reading Enterprise Security Lessons From the Crypto-Mining Craze

Hackers can execute malicious code through vulnerability in Transmission BitTorrent client

If you download content through the popular Transmission BitTorrent client, take a closer look at its security settings: a critical vulnerability has been detected by Google’s Project Zero reporting team. According to the report published Tuesday… Continue reading Hackers can execute malicious code through vulnerability in Transmission BitTorrent client

Did Your Developer Leave a Website Backdoor?

A Dutch developer stole e-commerce customers’ login credentials using a website backdoor and admin access that former employers had neglected to revoke.

The post Did Your Developer Leave a Website Backdoor? appeared first on Security Intelligence.

Continue reading Did Your Developer Leave a Website Backdoor?

The Increasing Dangers of Code Hooking

Cybercriminals use code hooking to intercept OS function calls to alter or augment their behavior. The technique is becoming more popular and dangerous.

The post The Increasing Dangers of Code Hooking appeared first on Security Intelligence.

Continue reading The Increasing Dangers of Code Hooking

Report: Federal Reserve Target of Constant Attacks

The U.S. Federal Reserve reported 50 breaches over the past five years including two that it is classifying as acts of cyber espionage, according to a Reuters Freedom of Information Request. Continue reading Report: Federal Reserve Target of Constant Attacks