HackDig : Dig high-quality web security articles for hacker

Surfing the Tsunami of Threat Data With Cognitive Security

Given today’s booming cybercrime landscape, there is a general feeling among IT professionals that no organization is safe. In fact, it’s probably safe to assume that everyone is under almost continuous attack. A data breach can result in stolen passwords, compromised personal information or even physical consequences such as hotel patrons being
Publish At:2017-04-19 09:05 | Read:907 | Comments:0 | Tags:Cognitive Security Intelligence & Analytics Cognitive Comput

Showcasing Threat Intelligence at IBM InterConnect

I am coming up on my third year of planning a topic track for IBM Security at the IBM InterConnect conference, and each year brings even more exciting content. This year, the introduction of Watson for Cyber Security adds yet another dimension to the usefulness and applicability of external threat intelligence. If you aren’t able to attend, fear not! T
Publish At:2017-03-09 17:45 | Read:695 | Comments:0 | Tags:Cognitive Security Intelligence & Analytics Threat Intellige

The Role of the Security Intelligence Analyst and the Three Main Elements of Cybersecurity

In the modern security operations center (SOC) model, the security intelligence analyst (SIA) represents a core role. In my opinion, it is one of the most important roles in the field of the cybersecurity. The Role of the Security Intelligence Analyst Customers often ask me what the role of the SIA actually is. The SIA is responsible for protecting the organ
Publish At:2017-03-08 04:55 | Read:780 | Comments:0 | Tags:Security Intelligence & Analytics IBM X-Force Exchange Secur

Dridex’s Cold War: Enter AtomBombing

IBM X-Force discovered that Dridex, one of the most nefarious banking Trojans active in the financial cybercrime arena, recently underwent a major version upgrade that is already active in online banking attacks in Europe. A few weeks ago, our cybercrime labs detected a new major version of the Dridex banking Trojan, Dridex v4. The updated code features a ne
Publish At:2017-03-01 00:05 | Read:1569 | Comments:0 | Tags:Advanced Threats Banking & Financial Services Fraud Protecti

Can You Inoculate Your Organization Against Cybercrime?

In the natural world, new viral threats arise and existing viruses evolve to defeat our defenses. Just look at the flu — during the 2015 to 2016 flu season, people around the globe were fighting strains out of Switzerland and Phuket. This year, everyone’s worried about new flu varieties from California, Hong Kong and Brisbane. That’s why we get a
Publish At:2017-02-20 13:10 | Read:1280 | Comments:0 | Tags:Health Care Security Intelligence & Analytics himss IBM X-Fo

Bringing the Power of Watson and Cognitive Computing to the Security Operations Center

Today, the average enterprise security operations center (SOC) is crushed under the burden of an estimated 200,000 pieces of security event data per day, according to IBM research. However, only a tiny percentage of those events require immediate action. Because alerts lack context, security teams must treat each equally. That means the average enterprise wa
Publish At:2017-02-13 15:10 | Read:1199 | Comments:0 | Tags:Cognitive Network & Endpoint Security Intelligence & Analyti

Overcoming the Security Side-Eye: Making Collaborative Threat Intelligence Work

The facial expression has many names: side-eye, skepticism, disbelief — the perfect, singular, arched eyebrow over a pair of glasses. Regardless of the name, it is one we have seen both digitally, virtually and in person when discussing collaborative threat intelligence. Yes, we can proclaim that the bad guys are working together and organized cybercrime is
Publish At:2017-02-10 13:10 | Read:740 | Comments:0 | Tags:Threat Intelligence Collaboration IBM X-Force Exchange Infor

Around the World With Zeus Sphinx: From Canada to Australia and Back

IBM X-Force researchers recently identified new infection campaigns delivering distinct Zeus Sphinx Trojan variants to online banking users in Canada and Australia. This is the first time our researchers have observed Sphinx campaigns with dedicated configurations targeting financial institutions in either of the two countries. We believe they are part of on
Publish At:2017-01-26 23:10 | Read:1076 | Comments:0 | Tags:Banking & Financial Services Fraud Protection Malware Threat

Expanding Threat Intelligence in IBM X-Force Exchange

Like a journalist, a security analyst must check multiple sources for additional information to verify or invalidate an assumption. Until recently, this was a rather tedious task. An analyst would have to reference various threat intelligence sites, enter the observable information in question and merge that data back into the main view. According to our res
Publish At:2017-01-20 01:20 | Read:1106 | Comments:0 | Tags:Threat Intelligence IBM X-Force Exchange Threat Sharing X-Fo

Turn Scrap Paper Into Security Investigations With IBM X-Force Threat Intelligence

Written by Stefan Walter, Front-End Developer, IBM Security. According to a recent study from Enterprise Strategy Group (ESG), nearly one-third of organizations have trouble operationalizing threat intelligence despite the plethora of sources of threat data. Open standards have helped tremendously in the effort to incorporate threat intelligence into existin
Publish At:2016-12-15 07:35 | Read:1208 | Comments:0 | Tags:Threat Intelligence X-Force Research Collaboration IBM X-For

Save Time by Accessing Multiple Threat Intelligence Streams at Once

We live in a world of information overload, where an incredible 2.5 quintillion bytes of data are created every day. Humans can only process a fraction of that information. Security analysts, responsible for maintaining the security of the company for which they work, must meet specific requirements regarding the information they leverage in their investigat
Publish At:2016-12-09 03:45 | Read:1490 | Comments:0 | Tags:Threat Intelligence IBM X-Force Exchange X-Force X-Force Fea

TrickBot Redirection Attacks Launched in Canada

The TrickBot Trojan, which emerged in the wild only this summer, continues to widen its attack scope, spreading farther in its target geographies and developing new redirection attacks. The most recent additions to TrickBot’s redirection targets are three Canadian banks. According to IBM X-Force researchers following the TrickBot Trojan’s ongoing
Publish At:2016-11-23 19:05 | Read:2035 | Comments:0 | Tags:Advanced Threats Banking & Financial Services Fraud Protecti

Join the Era of Collaborative Defense: Share the Intelligence

It’s commonly said that “there’s no I in team.” That’s certainly a platitude cybercriminals take to heart since they behave like one big, global team in many ways. They collaborate together on a vast scale, sharing information about their intended victims, including their user IDs, passwords, personal information, social circles
Publish At:2015-12-08 11:45 | Read:920 | Comments:0 | Tags:Security Intelligence & Analytics Application Security IBM S

Practical Indicators of Compromise and X-Force Exchange

The “IBM X-Force Threat Intelligence Quarterly – 4Q 2015” includes an article discussing indicators of compromise (IoCs), titled “The Power of Indicators of Compromise for Incident Forensics.” They can also be known as observables since they are artifacts that one can observe within the system’s environment. As that article note
Publish At:2015-12-02 11:05 | Read:1937 | Comments:0 | Tags:IBM X-Force IBM X-Force Exchange Incident Forensics Indicato

Security: It’s Better When Done Together

When it comes to security, there are a lot of unknowns out there. Every day can bring a new and unexpected threat, and it’s generally best to be on your guard at all times. In a way, it’s similar to deep-sea diving in that every descent is an adventure. Security professionals have worries like: Where are my greatest vulnerabilities? Has anyone al
Publish At:2015-11-19 15:40 | Read:880 | Comments:0 | Tags:Security Intelligence & Analytics IBM X-Force Exchange Infor


Share high-quality web security related articles with you:)


Tag Cloud