June 19, 2017 Welcome to the New European X-Force Command Center in Wroclaw, Poland 3 min read - This week, IBM opened its refurbished and expanded X-Force Command Center in Wroclaw, Poland, to help clients manage their EU-based data more securely.
Malware June 15, 2017 Zeus Sphinx Pushes Empty Configuration Files — What Has the Sphinx Got Cooking? 3 min read - Amid a period of targetless activity, IBM X-Force researchers are wondering where the operators behind the Zeus Sphinx Trojan are planning to strike next.
Threat Intelligence June 12, 2017 10 Ways to Fight Advanced Malware With Threat Intelligence Sharing 3 min read - The X-Force Exchange threat intelligence sharing platform brings collaboration to the forefront of the ongoing fight against WannaCry and other malware.
Advanced Threats June 6, 2017 Manufacturing Security Incidents: Forty Percent Higher Than Cross-Industry Average in 2016 2 min read - In manufacturing, security incidents occurred at a rate 40 percent higher than the average across all other industries in 2016, according to X-Force data.
Advanced Threats June 2, 2017 QakBot Banking Trojan Causes Massive Active Directory Lockouts 10 min read - IBM X-Force attributed a recent wave of malware-induced Active Directory (AD) lockouts across several IR engagements to the operators of the QakBot Trojan.
Incident Response May 30, 2017 When a Cyber Crisis Hits, Know Your OODA Loops 4 min read - OODA loops can help System 1-thinking security professionals react swiftly to cyberattacks and embrace an intuitive approach to incident response.
Energy & Utility May 26, 2017 Personalizing Energy Security With Robust Analytics 3 min read - To deliver the level of personalization today's prosumers demand, utilities must support their energy security strategies with predictive analytics.
Malware May 25, 2017 Unwrapping the Mystery: Did a Big, Slimy Internet Worm Make Hundreds of Organizations WannaCry? 6 min read - IBM X-Force revealed that WannaCry spread to its targets like a computer worm. But unlike a classic worm, it carried a malicious payload of ransomware.
Incident Response May 25, 2017 Incident Response: Planning for the Attack Before It Happens 2 min read - An effective backup strategy is simply one part of a larger security and incident response plan, which should be developed proactively.
Malware May 23, 2017 GootKit Malvertising Brings Redirection Attacks to Italian Banks 4 min read - The cybergang behind GootKit followed up its recent U.K. activity by launching redirection attacks at Italian banking services.