Incident Response April 9, 2019 Credential Dumping Campaign Hits Multinational Corporations 6 min read - X-Force researchers observed attackers targeting multinational corporations in various sectors using malicious scripts to automate attacks on misconfigured servers.
January 14, 2019 University of Maryland Researchers Use Audio Files and AI to Defeat reCaptcha Challenges 2 min read - University of Maryland researchers warn that with limited resources, threat actors could launch a successful cyberattack on Google's bot-detecting reCaptcha service.
August 23, 2018 Ramnit Infects More Than 100,000 Machines in Two Months 2 min read - A new campaign involving the Ramnit botnet that infected 100,000 computers over a two-month period may foreshadow an even larger attack, researchers warn.
Incident Response July 19, 2018 Why the Best Defense Is a Good Offensive Security Strategy 2 min read - Offensive security activities like cyberattack simulations, penetration testing and vulnerability assessments can help companies identify and remediate flaws before cybercriminals can exploit them.
Network May 8, 2018 Reflecting on the Memcached Reflection Attacks: A Wake-Up Call for Developers 3 min read - The memcached vulnerability isn't new, but attackers exploited it in late February to launch what might be the largest DDoS attack on record.
April 6, 2018 Nearly Half of Organizations Targeted Again Within a Year of Suffering a ‘Significant’ Cyberattack, Report Reveals 2 min read - Nearly half of organizations that suffered a "significant" cyberattack fell victim to bad actors again within a year's time, a recent security trends report revealed.
Incident Response November 13, 2017 The Grasshopper, the Ants and the Incident Response Plan 3 min read - The passive Grasshopper should be more like the Ants, who use IBM Resilient to support their robust and comprehensive incident response plan.
October 30, 2017 DUHK Vulnerability Offers a Quick Way to Launch a Crypto Attack 2 min read - Security researchers exposed a vulnerability in a random number generator with hardcoded keys that could lead to a crypto attack.
Malware October 25, 2017 Bad Rabbit Ransomware Attacks Highlight Risk of Propagating Malware Outbreaks 5 min read - Companies in Russia and Ukraine suffered a widespread attack known as Bad Rabbit that directed victims to a Dark Web site to pay for their stolen files.
September 19, 2017 Security Utility Abuses Supply Chain for a Malware Attack 2 min read - CCleaner was compromised at the main distribution site to include a malware attack. The Floxif attack is a downloader that breached the app supply chain.