Does your security program suffer from piecemeal detection and response?

Piecemeal Detection and Response (PDR) can manifest in various ways. The most common symptoms of PDR include: Multiple security information and event management (SIEM) tools (e.g., one on-premise and one in the cloud) Spending too much time or energy on integrating detection systems An underperforming security orchestration, automation and response (SOAR) system Only capable of […]

The post Does your security program suffer from piecemeal detection and response? appeared first on Security Intelligence.

Continue reading Does your security program suffer from piecemeal detection and response?

How the ZeuS Trojan Info Stealer Changed Cybersecurity

Information stealer malware is a type of malicious software designed to collect sensitive information from a victim’s computer. Also known as info stealers, data stealers or data-stealing malware, this software is true to its name: after infecting a computer or device, it’s highly adept at exfiltrating login credentials, financial information and personal data. Info stealers […]

The post How the ZeuS Trojan Info Stealer Changed Cybersecurity appeared first on Security Intelligence.

Continue reading How the ZeuS Trojan Info Stealer Changed Cybersecurity

And Stay Out! Blocking Backdoor Break-Ins

Backdoor access was the most common threat vector in 2022. According to the 2023 IBM Security X-Force Threat Intelligence Index, 21% of incidents saw the use of backdoors, outpacing perennial compromise favorite ransomware, which came in at just 17%. The good news? In 67% of backdoor attacks, defenders were able to disrupt attacker efforts and […]

The post And Stay Out! Blocking Backdoor Break-Ins appeared first on Security Intelligence.

Continue reading And Stay Out! Blocking Backdoor Break-Ins

The Evolution of Antivirus Software to Face Modern Threats

Over the years, endpoint security has evolved from primitive antivirus software to more sophisticated next-generation platforms employing advanced technology and better endpoint detection and response.   Because of the increased threat that modern cyberattacks pose, experts are exploring more elegant ways of keeping data safe from threats. Signature-Based Antivirus Software Signature-based detection is the use of […]

The post The Evolution of Antivirus Software to Face Modern Threats appeared first on Security Intelligence.

Continue reading The Evolution of Antivirus Software to Face Modern Threats

5 Holiday Cybersecurity Tips That Make A Real Impact

Tired of cybersecurity tips that don’t really make an impact? This post is for you.   The year is winding down to an end. Everyone, including security teams, is busy and preoccupied. Cyber actors know this and are gearing up to launch attacks. Over the holiday season, the global number of attempted ransomware attacks has increased […]

The post 5 Holiday Cybersecurity Tips That Make A Real Impact appeared first on Security Intelligence.

Continue reading 5 Holiday Cybersecurity Tips That Make A Real Impact

Raspberry Robin and Dridex: Two Birds of a Feather

IBM Security Managed Detection and Response (MDR) observations coupled with IBM Security X-Force malware research sheds additional light on the mysterious objectives of the operators behind the Raspberry Robin worm. Based on a comparative analysis between a downloaded Raspberry Robin DLL and a Dridex malware loader, the results show that they are similar in structure […]

The post Raspberry Robin and Dridex: Two Birds of a Feather appeared first on Security Intelligence.

Continue reading Raspberry Robin and Dridex: Two Birds of a Feather

Five Key Trends on SOC Modernization

For SOCs looking to improve their ability to detect and respond to threats efficiently and effectively, Extended Detection and Response (XDR) has generated increasing amounts of excitement and discourse in the industry. XDR was one of the hottest topics at RSA 2022, but like with many “hot new trends,” perspectives on what XDR actually is, […]

The post Five Key Trends on SOC Modernization appeared first on Security Intelligence.

Continue reading Five Key Trends on SOC Modernization

IBM to Acquire Randori, Transforming How Clients Manage Risk with Attack Surface Management

Organizations today are faced with defending a complex technology landscape — with cyberattacks targeted at constantly changing cloud, distributed, and on-premises environments. Often escaping security scans and periodic assessments, these changes represent windows of opportunities for attackers looking to bypass defenses. While there always have — and always will be — unknown risks, having a […]

The post IBM to Acquire Randori, Transforming How Clients Manage Risk with Attack Surface Management appeared first on Security Intelligence.

Continue reading IBM to Acquire Randori, Transforming How Clients Manage Risk with Attack Surface Management

2021 Cyber Resilient Organization Study: Rise of Ransomware Shows the Need for Zero Trust and XDR

“How many millions did you pay threat actors in a ransomware attack?” “Which investments most significantly improved cyber resiliency for your organization?” “Do you have a cybersecurity incident response plan that’s applied consistently across your enterprise?” The answers to these and other key questions produced several notable findings in the latest 2021 Cyber Resilient Organization […]

The post 2021 Cyber Resilient Organization Study: Rise of Ransomware Shows the Need for Zero Trust and XDR appeared first on Security Intelligence.

Continue reading 2021 Cyber Resilient Organization Study: Rise of Ransomware Shows the Need for Zero Trust and XDR

Know the Four Pillars of Cloud Security That Reduce Data Breach Risk

Can having a mature, comprehensive cloud security strategy reduce the impact of data breaches on your organization? Results from the latest Cost of a Data Breach Report indicate that taking this approach might produce potential savings for your business. Among other findings, the report noted that the mature use of security analytics was associated with […]

The post Know the Four Pillars of Cloud Security That Reduce Data Breach Risk appeared first on Security Intelligence.

Continue reading Know the Four Pillars of Cloud Security That Reduce Data Breach Risk