November 20, 2018 TA505 Threat Group Distributes Previously Undocumented tRat Remote Access Trojan < 1 min read - Researchers observed the TA505 threat group spreading a previously undocumented remote access Trojan (RAT) called tRaT.
Artificial Intelligence October 30, 2018 Artificial Intelligence, Real Concerns: Hype, Hope and the Hard Truth About AI 4 min read - With a corporate culture that supports transparency and human agency, it's possible to maximize the existing benefits of artificial intelligence (AI) while laying the groundwork for the future of AI.
Network October 26, 2018 Is Malware Analysis Right for Your Business? 2 min read - For companies that want to understand what is happening in their networks but lack malware analysis tools, using what is publicly available could be the difference between an infection and a crisis.
October 9, 2018 Threat Actors Use Delphi Packer to Shield Binaries From Malware Classification 2 min read - Security researchers observed threat actors using a Delphi packer to shield their binaries from malware classification by antivirus and other detection tools.
Fraud Protection May 1, 2018 Analyzing PDF and Office Documents Delivered Via Malspam 6 min read - Endpoint detection and antiphishing tools can help users filter basic spam email, but detecting malspam in PDF and Microsoft Office documents requires a more thorough investigation.
Incident Response April 23, 2018 How to Choose the Right Malware Classification Scheme to Improve Incident Response 6 min read - Analysts can improve and automate their incident response processes by adopting the right malware classification scheme according to specific threat management goals.
Malware October 3, 2017 POS Malware Breach Sees Payment Cards Hit Underground Shops 8 min read - A popular fast-food chain and supermarket were recently breached by POS malware. Some of the credit card details had been up for sale for more than a week.
Incident Response August 28, 2017 Using a Free Online Malware Analysis Sandbox to Dig Into Malicious Code 6 min read - A public malware sandbox can be a great substitute for an in-house malware analysis solution — as long as you understand its limitations.
X-Force July 27, 2017 Hello, My Name Is Space Rogue 3 min read - IBM X-Force Red marked its first anniversary with the addition of security specialists, including Space Rogue, bolstering the team's talent roster.
Network July 14, 2017 The Limits of Linguistic Analysis for Security Attribution 2 min read - Linguistic analysis can provide clues to help security analysts trace the source of a cyberattack, but the method is inconclusive on its own.