Intelligence & Analytics May 6, 2016 Does Mom Know Best About Internet Security? 2 min read - What does mom know about security? Probably more than we'd like to admit. Here are some of mom's favorite life lessons, security-style.
X-Force May 5, 2016 Footprinting and Brute-Force Attacks Remain Prevalent 2 min read - With so much attention focused on APTs and mutating malware, it's easy to overlook brute-force attacks — which can still be successful.
Software Vulnerabilities April 28, 2016 Understanding EdgeHTML’s Attack Surface and Exploit Mitigations 5 min read - EdgeHTML's large attack surface can be daunting for users. Learn more about possible attacks as well as exploit mitigations that enhance security.
Advanced Threats April 25, 2016 Time Is Money: GozNym Launches Redirection Attacks in Poland 5 min read - The GozNym banking Trojan has pivoted its focus from targeting North American institutions to launching redirection attacks in Europe.
Malware April 14, 2016 Meet GozNym: The Banking Malware Offspring of Gozi ISFB and Nymaim 5 min read - The new GozNym hybrid takes the best of both the Nymaim and Gozi ISFB malware to create a powerful Trojan targeting banks in the U.S. and Canada.
X-Force April 12, 2016 Enhancing Incident Response: The Role of Strategic Partners in Your Security Posture 6 min read - Strategic relationships may be an organization's principal source for obtaining essential artifacts in incident response investigations.
Advanced Threats April 7, 2016 Unraveling ZeuS.Maple’s Stealth Loader 5 min read - ZeuS.Maple is a relatively new variant of a stealth loader that enables a few tricks to stay under the radar of security researchers and tools.
Intelligence & Analytics April 4, 2016 The Next Big Thing: Who Drives the Security Agenda? 3 min read - Cybercriminals may be the ones setting the security agenda, but security professionals can collaborate to defeat malicious actors and improve defenses.
Threat Intelligence March 31, 2016 Know Your Enemy: Understanding the Motivation Behind Cyberattacks 2 min read - Understanding the motivation behind cyberattacks — and knowing who could be after your organization — can help you reduce your security risk.
Advanced Threats March 30, 2016 The Silver Lining of a Ransomware Infection 4 min read - If you need a silver lining, think of a ransomware event as a low-cost security assessment pointing out weaknesses in your organization's environment.