Practice: The Best Defense for Responding to Cyber Incidents

When it comes to defending an organization against cyberattacks and their aftershocks, the best way to shore up incident response is to practice.

The post Practice: The Best Defense for Responding to Cyber Incidents appeared first on Security Intelligence.

Continue reading Practice: The Best Defense for Responding to Cyber Incidents

Diving Into Zberp’s Unconventional Process Injection Technique

IBM X-Force Research discovered a new variant of Zberp that evades API threat detection tools using a code injection technique it borrowed from Carberp.

The post Diving Into Zberp’s Unconventional Process Injection Technique appeared first on Security Intelligence.

Continue reading Diving Into Zberp’s Unconventional Process Injection Technique

Diving Into Zberp’s Unconventional Process Injection Technique

IBM X-Force Research discovered a new variant of Zberp that evades API threat detection tools using a code injection technique it borrowed from Carberp.

The post Diving Into Zberp’s Unconventional Process Injection Technique appeared first on Security Intelligence.

Continue reading Diving Into Zberp’s Unconventional Process Injection Technique

The ‘Cracken’: The Evolution of Password Cracking

IBM X-Force Red is leading the way in the field of password cracking with the Cracken, a tool designed to help companies improve password hygiene.

The post The ‘Cracken’: The Evolution of Password Cracking appeared first on Security Intelligence.

Continue reading The ‘Cracken’: The Evolution of Password Cracking

Put Threat Intelligence Into Action With Security Apps

An update to IBM X-Force Exchange provides recommended apps to help users implement threat intelligence into their end-to-end security portfolio.

The post Put Threat Intelligence Into Action With Security Apps appeared first on Security Intelligence.

Continue reading Put Threat Intelligence Into Action With Security Apps

Network Attacks Containing Cryptocurrency CPU Mining Tools Grow Sixfold

IBM Managed Security Services (MSS) detected a sixfold increase in attacks involving embedded CPU mining tools between January and August 2017.

The post Network Attacks Containing Cryptocurrency CPU Mining Tools Grow Sixfold appeared first on Security Intelligence.

Continue reading Network Attacks Containing Cryptocurrency CPU Mining Tools Grow Sixfold

Downward Trend in Publicly Available Exploit Code? Don’t Ease Up on Patch Management Just Yet

IBM X-Force reported a downward trend in publicly available exploit code, but security teams must still prioritize vulnerability and patch management.

The post Downward Trend in Publicly Available Exploit Code? Don’t Ease Up on Patch Management Just Yet appeared first on Security Intelligence.

Continue reading Downward Trend in Publicly Available Exploit Code? Don’t Ease Up on Patch Management Just Yet

Stay Up to Date on Threat Intelligence With New X-Force Exchange Capabilities

The IBM X-Force Exchange features new capabilities and notifications to help security analysts collaborate and share threat intelligence more efficiently.

The post Stay Up to Date on Threat Intelligence With New X-Force Exchange Capabilities appeared first on Security Intelligence.

Continue reading Stay Up to Date on Threat Intelligence With New X-Force Exchange Capabilities

Hello, My Name Is Space Rogue

IBM X-Force Red marked its first anniversary with the addition of security specialists, including Space Rogue, bolstering the team’s talent roster.

The post Hello, My Name Is Space Rogue appeared first on Security Intelligence.

Continue reading Hello, My Name Is Space Rogue

IBM X-Force Red Turns 1, Expands Into Auto and IoT Practice Areas

Today IBM X-Force Red launches a collaboration with the Watson IoT Platform to help ensure that all IoT solutions get our special brand of hacker love.

The post IBM X-Force Red Turns 1, Expands Into Auto and IoT Practice Areas appeared first on Security Intelligence.

Continue reading IBM X-Force Red Turns 1, Expands Into Auto and IoT Practice Areas