X-Force December 2, 2015 Practical Indicators of Compromise and X-Force Exchange 8 min read - IBM's X-Force Exchange is a threat intelligence platform that facilitates information sharing and research surrounding indicators of compromise.
X-Force November 23, 2015 A Kitten and an Information Security Analyst Walk Into a Bar… 3 min read - What happens when a kitten and an information security analyst walk into a bar? In one scenario, the kitten teaches the expert some things about security.
Intelligence & Analytics November 19, 2015 Security: It’s Better When Done Together 2 min read - IBM's X-Force Exchange encourages security professionals to share threat intelligence information, which in turn helps the entire industry advance.
X-Force November 17, 2015 A Look Back With IBM X-Force: Lessons Learned From Security Research in 2015 2 min read - The latest 2015 IBM X-Force Threat Intelligence Quarterly focuses on the lessons learned from security research throughout the year.
CISO November 13, 2015 Security On Demand: From Endpoint to Mainframe, Passing Through the Cloud 2 min read - There are many security tools available to enterprises today, and the current threat landscape is forcing providers to alter their offerings.
Threat Intelligence October 7, 2015 Comparing Different Tools for Threat Sharing 4 min read - Threat sharing is getting more and more attention from security professionals to detect and quickly respond to security threats.
Malware October 2, 2015 UK Banks Hit With New Zeus Sphinx Variant and Renewed Kronos Banking Trojan Attacks 6 min read - IBM Security X-Force researchers have discovered instances of the Kronos banking Trojan and Zeus Sphinx malware being used by cybercriminals in the wild.
Malware September 28, 2015 Shifu Officially Spreads to the UK: Banks and Wealth Management Firms Beware 2 min read - The Shifu banking Trojan has gone through yet another rejuvenation, this time transforming to target banks and wealth management firms in the U.K.
Intelligence & Analytics September 16, 2015 Forecasting a Breach Is Like Finding a Needle in a Haystack — Not That Tough 5 min read - Forecasting a data breach doesn't have to be difficult. With the help of threat intelligence and collaboration, organizations can spot vulnerabilities.
Malware September 10, 2015 An Overnight Sensation — CoreBot Returns as a Full-Fledged Financial Malware 6 min read - CoreBot's developers have evolved the malware into a full-fledged banking Trojan that executes a variety of attacks to steal victims' bank credentials.