Threat Intelligence September 9, 2015 Certificates-as-a-Service? Code Signing Certs Become Popular Cybercrime Commodity 10 min read - IBM Security X-Force researchers recently uncovered a new trend dominating the cybercrime underground: the sale of stolen or fraudulent certificates.
Software Vulnerabilities September 8, 2015 Markdown: Designer Vulnerabilities Get a Fresh CVSS v3 Look 3 min read - The Common Vulnerability Scoring System (CVSS) has been completely redone to more accurately reflect the scope and impact of vulnerabilities.
Malware September 4, 2015 An Example of Common String and Payload Obfuscation Techniques in Malware 9 min read - IBM X-Force researcher Igor Aronov examines some common techniques used by malware authors to complicate dynamic (automated) and static (manual) analysis.
Malware September 1, 2015 The Myth of the Obvious Malware 4 min read - Malware doesn't present itself like it's often depicted in the movies, so it's up to enterprises to be on the lookout for these stealthy programs.
Advanced Threats August 31, 2015 Shifu: ‘Masterful’ New Banking Trojan Is Attacking 14 Japanese Banks 7 min read - A brand -ew advanced banking Trojan discovered in the wild has been named Shifu by IBM Security X-Force, after the Japanese word for thief.
Malware August 28, 2015 Watch Out for CoreBot, New Stealer in the Wild 5 min read - IBM Security X-Force researchers recently discovered CoreBot, a seemingly generic malware that actually operates on a highly sophisticated level.
X-Force August 25, 2015 The Myth of the Omnipotent Hacker 3 min read - The way movies and television shows portray a hacker is far off from reality. In today's collaborative world, attackers are often working in crime rings.
X-Force August 24, 2015 Anonymity and Cryptocurrencies Enabling High-Stakes Extortion 3 min read - The third 2015 IBM X-Force Threat Intelligence Quarterly has been released, detailing the evolution of ransomware, anonymous routers and more.
Threat Intelligence August 20, 2015 Dyre Summer Renovation: Randomized Config File Names Keep Antivirus Engines Guessing 5 min read - Developers of the Dyre malware are keeping a close eye on security, making several changes to the file configuration to avoid detection.
Threat Intelligence August 18, 2015 Gozi Goes to Bulgaria — Is Cybercrime Heading to Less Charted Territory? 4 min read - The latest version of the Gozi banking Trojan looks to target banks in Bulgaria. This could be just the first instance of the malware in Eastern Europe.