Information and Communication Technology (ICT) Industry: Second-Most Attacked Sector in 2016

The information and communication technology (ICT) industry suffered the second-most attacks out of all sectors monitored by IBM X-Force in 2016.

The post Information and Communication Technology (ICT) Industry: Second-Most Attacked Sector in 2016 appeared first on Security Intelligence.

Continue reading Information and Communication Technology (ICT) Industry: Second-Most Attacked Sector in 2016

When a Cyber Crisis Hits, Know Your OODA Loops

OODA loops can help System 1-thinking security professionals react swiftly to cyberattacks and embrace an intuitive approach to incident response.

The post When a Cyber Crisis Hits, Know Your OODA Loops appeared first on Security Intelligence.

Continue reading When a Cyber Crisis Hits, Know Your OODA Loops

Incident Response: Planning for the Attack Before It Happens

An effective backup strategy is simply one part of a larger security and incident response plan, which should be developed proactively.

The post Incident Response: Planning for the Attack Before It Happens appeared first on Security Intelligence.

Continue reading Incident Response: Planning for the Attack Before It Happens

Not-So-Terrible Twos: IBM X-Force Exchange Celebrates Its Second Birthday

Since its inception two years ago, the IBM X-Force Exchange has grown into a comprehensive hub for industrywide threat intelligence collaboration.

The post Not-So-Terrible Twos: IBM X-Force Exchange Celebrates Its Second Birthday appeared first on Security Intelligence.

Continue reading Not-So-Terrible Twos: IBM X-Force Exchange Celebrates Its Second Birthday

Cybercriminals Riding Tax Filing Tides: Tax Fraud Season in Effect

IBM X-Force researchers discovered that the volume of spam email campaigns carrying tax fraud scams rises sharply during the months surrounding tax season.

The post Cybercriminals Riding Tax Filing Tides: Tax Fraud Season in Effect appeared first on Security Intelligence.

Continue reading Cybercriminals Riding Tax Filing Tides: Tax Fraud Season in Effect

The NukeBot Trojan, a Bruised Ego and a Surprising Source Code Leak

After being spurned by his cybercriminal peers on underground forums, the creator of NukeBot apparently leaked the banking Trojan’s source code.

The post The NukeBot Trojan, a Bruised Ego and a Surprising Source Code Leak appeared first on Security Intelligence.

Continue reading The NukeBot Trojan, a Bruised Ego and a Surprising Source Code Leak

CAPEC: Making Heads or Tails of Attack Patterns

The CAPEC standard for attack categorization enables analysts to more efficiently classify, prioritize and communicate about common threats and events.

The post CAPEC: Making Heads or Tails of Attack Patterns appeared first on Security Intelligence.

Continue reading CAPEC: Making Heads or Tails of Attack Patterns

Churn Under the Surface of Global Cybercrime

Global cybercrime actors test their malware in small settings before launching internationally, leaving trails of clues to tip off astute security teams.

The post Churn Under the Surface of Global Cybercrime appeared first on Security Intelligence.

Continue reading Churn Under the Surface of Global Cybercrime

Churn Under the Surface of Global Cybercrime

Global cybercrime actors test their malware in small settings before launching internationally, leaving trails of clues to tip off astute security teams.

The post Churn Under the Surface of Global Cybercrime appeared first on Security Intelligence.

Continue reading Churn Under the Surface of Global Cybercrime

Showcasing Threat Intelligence at IBM InterConnect

At InterConnect 2017, experts will demonstrate how IBM is applying Watson for Cyber Security to take threat intelligence to the next level.

The post Showcasing Threat Intelligence at IBM InterConnect appeared first on Security Intelligence.

Continue reading Showcasing Threat Intelligence at IBM InterConnect