You searched for IBM Security | SC Media

Your search for IBM Security returned 25 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Post remove
Last 2 years remove

Your search for IBM Security returned 25 results

Sort Results:

Relevant Recent
RiskSec 2020, Security News

How to use cybersecurity to accelerate growth

Cybersecurity often – and rightly – has been viewed as a point of friction and a cost center, but more recently organizations are using it to accelerate growth. When considered early on – in everything from design and development through planning and execution – security can help companies lower risk and get applications and services…
trojanhorse_1032765
Malware, Security News

IcedID banking trojan now used against online retailers

The malicious actors behind the IcedID banking trojan have branched out and are now using the malware to steal payment card credentials from online retailers and may have even become malware-as-a-service dealers. The e-tailer attacks began in November 2018 and instead of grabbing customer banking information, IcedID is used to grab credentials and payment card…
Security News

Resilience improved, but response dragged down by too many tools, too few playbooks, report says

While cybersecurity resilience has largely improved over five years, most organizations – 74 percent – say their security response plans are ad-hoc, applied inconsistently or are non-existent even as 13 percent say their ability to contain an attack has declined, a report on resiliency found. Organizations have too many security tools and not enough specific…
Researchers detail BEC scams
Email Security, Home

World Health Organization warns about coronavirus phishing scams

The World Health Organization (WHO) issued a warning today stating scammers are disguising themselves as WHO representatives to try and con people out of money and personal information. The WHO said phishing emails, phone calls, fake websites, texts and even faxes are being sent under the WHO name asking for various types of login information,…
APTs/cyberespionage, Cybercrime, Malware, Security News

Bahraini oil company reportedly attacked by new ‘Dustman’ disk wiper

Bapco, the national oil company of the Persian Gulf island nation of Bahrain, was reportedly targeted in a Dec. 29 disk wiper attack that officials believe originated from Iran-backed hackers. Iran is historically associated with past disk wiper campaigns against energy companies, most notably the destructive Shamoon or Disttrack malware attack against the Saudi Arabian…
APTs/cyberespionage, Cybercrime, Government/Defense, Phishing, Security News

Leaked videos offer rare behind-the-scenes look at Iranian APT operation

Threat analysts hit the cyber intel mother lode after uncovering a 40GB data leak that included training videos shedding light on the activities of an Iranian advanced persistent threat group. In a company blog post this week, IBM X-Force Incident Response Intelligence Services (IRIS) said that the leaked assets were the result of an OPSEC error on…
Cybercrime, Events, Malware, Ransomware, Security News

Destructive malware attacks double as attackers pair ransomware with disk wipers

IBM Security’s X-Force Incident Response and Intelligence Services (IRIS) team reported this week that it witnessed a 200 percent increase in destructive malware attacks over the first half of 2019, compared to the second half of 2018. These malware attacks typically incorporated a disk wiper component to them. Wipers are historically associated with nation-state-sponsored attacks…
Sponsor Content

How AI can be used for malicious purposes

The amplified efficiency of AI means that, once a system is trained and deployed, malicious AI can attack a far greater number of devices and networks more quickly and cheaply than a malevolent human actor. Given sufficient computing power, an AI system can launch many attacks, be more selective in its targets and more devastating…
Possible link discovered that ties together Wi-Fi routers with backdoors
Network Security, Security News

Verizon FIOS, TP Link patch major vulnerabilities in routers

Researchers have revealed that certain Verizon and TP Link routers have severe vulnerabilities that that could lead to remote command injection in the former and a zero-day attack on the latter. Tenable Research found three vulnerabilities in Verizon’s Fios Quantum Gateway routers, which are supplied to almost every new Verizon Fios customer, while IBM Security…
Next post in Network Security