Search engine optimization (SEO) is a long game. Improving your website to rank higher on search engine results pages helps you attract more traffic. Plus, it helps build a trustworthy…
Browsing CategoryBlack Hat
Controlling the Source: Abusing Source Code Management Systems
For full details on this research, see the X-Force Red whitepaper “Controlling the Source: Abusing Source Code Management Systems”. This material is also being presented at Black Hat USA 2022.…
Black Hat 2022 Sneak Peek: How to Build a Threat Hunting Program
You may recall my previous blog post about how our X-Force veteran threat hunter Neil Wyler (a.k.a “Grifter”) discovered nation-state attackers exfiltrating unencrypted, personally identifiable information (PII) from a company’s…
ITG18: Operational Security Errors Continue to Plague Sizable Iranian Threat Group
This blog supplements a Black Hat USA 2021 talk given August 2021. IBM Security X-Force threat intelligence researchers continue to track the infrastructure and activity of a suspected Iranian threat…
Ripple20 bugs set off wave of security problems in millions of devices
Security researchers have discovered a handful of game-changing vulnerabilities that spell trouble for dozens of connected device vendors and their customers.
7 Can’t-Miss Cybersecurity Lessons From Black Hat USA and Vegas Security Week
As Black Hat USA and DEF CON 2019 draw to a close, the security industry continues to buzz over events from the annual Las Vegas security week. Each year, nearly…
Fake news doesn’t (always) fool mice
Mice can interpret speech phonemes correctly up to 80% of the time without falling for semantic hoodwinks like humans do. This post appeared first on Naked Security Blog by Sophos…
Apple will hand out unlocked iPhones to vetted researchers
It formalizes the reality: “pre-jailbroken” iPhones were already on the black market. This post appeared first on Naked Security Blog by Sophos Author: Lisa Vaas
From Backhoes to Operating Systems: The Top Five ATM Security Weaknesses
Few targets are as appealing to criminals as automatic teller machines (ATMs). After all, they can store hundreds of thousands of dollars and, unlike banks or armored cars, can have…
Top Five Security Focus Areas for Mainframes
Mainframes remain the backbone of the world’s transaction processing infrastructure, from financial data, to business logic, to customer data and more. Because of their significance in this process, mainframes once…