More_eggs, Anyone? Threat Actor ITG08 Strikes Again

Reading Time: 14 minutes X-Force IRIS observed ITG08, which has historically targeted POS machines in the retail and hospitality sectors, injecting malicious code into online checkout pages to steal payment card data.

The post More_eggs, Anyone? Threat Actor ITG08 Strikes Again appeared first on Security Intelligence.

Continue reading More_eggs, Anyone? Threat Actor ITG08 Strikes Again

How to Fight Back Against Macro Malware

Per X-Force IRIS, at least 22 percent of reported campaigns in April 2019 delivered macro malware. What methods can defenders leverage to help detect malicious macro activity?

The post How to Fight Back Against Macro Malware appeared first on Security Intelligence.

Continue reading How to Fight Back Against Macro Malware

What Happens When Malware Sneaks Into Reputable Hardware, Applications and App Stores?

To avoid malware, always get hardware and software from authorized and reputable sources and vendors, right? But what happens when those same sources actually contain or deliver malicious payloads?

The post What Happens When Malware Sneaks Into Reputable Hardware, Applications and App Stores? appeared first on Security Intelligence.

Continue reading What Happens When Malware Sneaks Into Reputable Hardware, Applications and App Stores?

Dark Web TLS/SSL Certificates Highlight Need for Shift to Zero Trust Security

Some of the latest website security threats originate from thriving dark web marketplaces for TLS/SSL certificates, which often come packaged with other cybercrime services.

The post Dark Web TLS/SSL Certificates Highlight Need for Shift to Zero Trust Security appeared first on Security Intelligence.

Continue reading Dark Web TLS/SSL Certificates Highlight Need for Shift to Zero Trust Security

Now That You Have a Machine Learning Model, It’s Time to Evaluate Your Security Classifier

Now that you’ve identified an AI solution and selected a suitable algorithm for your machine learning model, you’re ready to measure the effectiveness of your security classifier.

The post Now That You Have a Machine Learning Model, It’s Time to Evaluate Your Security Classifier appeared first on Security Intelligence.

Continue reading Now That You Have a Machine Learning Model, It’s Time to Evaluate Your Security Classifier

It’s Time to Modernize Traditional Threat Intelligence Models for Cyber Warfare

Cybersecurity industry leaders should define a new threat intelligence model that is three-dimensional, nonlinear, rooted in elementary number theory and that applies vector calculus.

The post It’s Time to Modernize Traditional Threat Intelligence Models for Cyber Warfare appeared first on Security Intelligence.

Continue reading It’s Time to Modernize Traditional Threat Intelligence Models for Cyber Warfare

The Cyber Attribution Dilemma: 3 Barriers to Cyber Deterrence

The concept of mutually assured destruction (MAD) has historically prevented nuclear war, but threat actors’ advanced obfuscation techniques have made cyber deterrence difficult if not impossible.

The post The Cyber Attribution Dilemma: 3 Barriers to Cyber Deterrence appeared first on Security Intelligence.

Continue reading The Cyber Attribution Dilemma: 3 Barriers to Cyber Deterrence

More Than Just a Fad: Lessons Learned About Threat Hunting in 2018

One cybersecurity capability that continues to prove it’s here to stay is threat hunting, a proactive approach to discovering and mitigating threats.

The post More Than Just a Fad: Lessons Learned About Threat Hunting in 2018 appeared first on Security Intelligence.

Continue reading More Than Just a Fad: Lessons Learned About Threat Hunting in 2018

Machine Learning Algorithms Are Not One-Size-Fits-All

Before you can choose the right machine learning algorithms to serve your business’ needs, you must understand the type of problem you’re trying to solve and the type of training data you’ll need.

The post Machine Learning Algorithms Are Not One-Size-Fits-All appeared first on Security Intelligence.

Continue reading Machine Learning Algorithms Are Not One-Size-Fits-All

How Nick Bradley Made a Career of Pursuing Bad Guys, From the Military to X-Force IRIS

X-Force IRIS Practice Lead Nick Bradley was on track for an illustrious career in the military police when a computer virus detoured his path towards protection of a different kind.

The post How Nick Bradley Made a Career of Pursuing Bad Guys, From the Military to X-Force IRIS appeared first on Security Intelligence.

Continue reading How Nick Bradley Made a Career of Pursuing Bad Guys, From the Military to X-Force IRIS