Security today released its annual X-Force Threat Intelligence Index finding that although ransomware's share of incidents declined only slightly (4 percentage points) from 2021 to 2022, defenders were more successful detecting and preventing ransomware. Despite this, attackers continued to innovate with the report showing the average time to complete a ransomware attack dropped from 2 months down to less than 4 days.

newsroom.ibm.com/2023-02-22-IB

#ibm #cybersecurity #infosec #ibmsecurity #ibmxforce #XForce #threatintelligenceindex #threatintel

Last updated 2 years ago

Interesting post on IBM Security SecurityIntelligence blog about Synthetic Media-Based Social Engineering.

Long story short, media — sound, video, pictures and written words — are no longer reliable forms of authentication.

securityintelligence.com/artic

#cybersecurity #infosec #deepfake #ai #socialengineering #ibm #ibmsecurity

Last updated 2 years ago

Good read on how Security X-Force identified a novel technique employed by an attacker to introduce a command and control (C2) channel built upon channel messages.

securityintelligence.com/posts

#ibm #discord #cybersecurity #infosec #ibmsecurity #ibmxforce

Last updated 2 years ago

:redhat:​ Red Hat Insights malware detection service is now generally available!

This detection service is a monitoring and assessment tool that scans Red Hat Enterprise Linux () systems for the presence of malware, utilizing over 180 signatures of known malware provided in partnership with the X-Force Threat Intelligence team.

redhat.com/en/blog/red-hat-ins

#malware #rhel #linux #ibm #cybersecurity #infosec #redhat #ibmxforce #XForce #ibmsecurity

Last updated 2 years ago

commissioned a study from Morning Consult that surveyed over 1,100 cybersecurity incident responders across ten countries. Unsurprisingly, over two-thirds of respondents experienced daily stress or anxiety due to the pressures of responding to a cyber incident. Despite the challenges, responders are willing to take on the IR role because of their exemplary sense of duty.

But perhaps one of the underrated perks of working in incident response is the ability to tell outrageous true stories.

Read more about these exciting stories here ⬇️

securityintelligence.com/artic

#ibmsecurity #cybersecurity #infosec #incidentresponse #ibm

Last updated 2 years ago

Latest from @MikeElgan on SecurityIntelligence blog:

Twitter is the New Poster Child for Failing at Compliance

... In short, use Twitter as a perfect bad example. Make sure to properly staff and fund your compliance teams. Place direct and clear responsibility on qualified professionals. And get the whole organization on board.

securityintelligence.com/artic

#ibm #ibmsecurity #compliance #appsec #gdpr #ftc

Last updated 2 years ago

A Recon integration for is now available on the App Exchange.

Integrating Randori Recon with QRadar SOAR empowers analysts with bi-directional synchronization between solutions, enabling queries of Randori Targets and the ability to create and update corresponding cases in QRadar SOAR.

community.ibm.com/community/us

#Randori #qradar #soar #ibm #cybersecurity #infosec #ibmsecurity

Last updated 2 years ago

4 Most Common Cyberattack Patterns from 2022. Article on SecurityIntelligence.

Likely to continue in 2023...

  1. E-mail Compromise
  2. Supply Chain Attacks
  3. Attacks on Internet of Things () Devices

securityintelligence.com/artic

#ransomware #iot #cybersecurity #infosec #ibmsecurity #ibm

Last updated 2 years ago

"The Cybersecurity Takeaway from Twitter’s Verification Chaos", @MikeElgan's latest article on SecurityIntelligence blog.

securityintelligence.com/artic

#ibmsecurity #cybersecurity #infosec

Last updated 2 years ago

"The Cybersecurity Takeaway from Twitter’s Verification Chaos", @MikeElgan's latest article on SecurityIntelligence blog

securityintelligence.com/artic

#ibmsecurity #cybersecurity #infosec

Last updated 2 years ago

In September 2022, patched an information disclosure vulnerability in SPNEGO NEGOEX (CVE-2022-37958).

On December 13, Microsoft reclassified the as “Critical” severity after Security X-Force Red Security Researcher Valentina Palmiotti (@chompie1337) discovered the vulnerability could allow attackers to remotely execute code ().

securityintelligence.com/posts

#microsoft #vulnerability #ibm #rce #ibmsecurity #XForce

Last updated 2 years ago

For anyone trying to get their heads wrapped around best practices for role management in the identity and access management space, watch this pretty comprehensive 9:00 minutes video from Distinguished Engineer Jeff Crume on the topic.

youtu.be/5v4v-MPoEOs

#ibm #iam #identitymanagement #identitygovernance #ibmsecurity #cybersecurity #infosec

Last updated 2 years ago

Another threat group, the ‘Eternity Project’, offers a Malware-as-a-Service... service from a website and on their Telegram channel.

They sell a wide variety of (for $90 to $490) in an organized fashion, including stealer, clipper, worm, miner, and distributed-denial-of-service bot services.

securityintelligence.com/news/

#tor #malware #ransomware #cybersecurity #security #infosec #ibmsecurity

Last updated 2 years ago

Tarnkappe.info · @tarnkappeinfo
1529 followers · 3787 posts · Server social.tchncs.de
ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online