The metaverse, artificial intelligence (AI) run amok, the singularity … many far-out situations have become a dinner-table conversation. Will AI take over the world? Will you one day have a…
Browsing CategoryAdvanced Malware
TrickBot Bolsters Layered Defenses to Prevent Injection Research
This post was written with contributions from IBM X-Force’s Limor Kessem and Charlotte Hammond. The cyber crime gang that operates the TrickBot Trojan, as well as other malware and ransomware…
X-Force Threat Intelligence: Monthly Malware Roundup
Today’s reality means that organizations need to be constantly vigilant against security breaches. Having a robust incident response plan in place is vital. IBM Security X-Force is a team dedicated…
From Thanos to Prometheus: When Ransomware Encryption Goes Wrong
IBM Security X-Force researchers have recently reverse-engineered Prometheus ransomware samples as part of ongoing incident response operations. X-Force has found that samples that infected organizational networks featured flawed encryption. This…
From Thanos to Prometheus: When Ransomware Encryption Goes Wrong
IBM Security X-Force researchers have recently reverse-engineered Prometheus ransomware samples as part of ongoing incident response operations. X-Force has found that samples that infected organizational networks featured flawed encryption. This…
Cryptominers Snuck Logic Bomb Into Python Packages
Malware can show up where you least expect it. Researchers discovered a logic bomb attack in the Python Package Index (PyPI) repository, which is code repository for Python developers and…
Fighting Cyber Threats With Open-Source Tools and Open Standards
Detecting cyber threats is usually the first critical step in the mitigation of cyber attacks. Common means to achieve this goal are rules or analytics that track network and system…
What Has Changed Since the 2017 WannaCry Ransomware Attack?
The cybersecurity world is still feeling the effects of the 2017 WannaCry ransomware attack today. While the majority of the damage occurred in the weeks after May 12, 2017, WannaCry…
Cyberattacks Use Office 365 to Target Supply Chain
Malicious actors have a history of trying to compromise users’ Office 365 accounts. By doing so, they can tunnel into a network and use their access to steal sensitive information.…
RoboSki and Global Recovery: Automation to Combat Evolving Obfuscation
In a recent collaboration to investigate a rise in malware infections featuring a commercial remote access trojan (RAT), IBM Security X-Force and Cipher Tech Solutions (CT), a defense and intelligence…