HackDig : Dig high-quality web security articles for hacker

The Role of the Security Intelligence Analyst and the Three Main Elements of Cybersecurity

In the modern security operations center (SOC) model, the security intelligence analyst (SIA) represents a core role. In my opinion, it is one of the most important roles in the field of the cybersecurity. The Role of the Security Intelligence Analyst Customers often ask me what the role of the SIA actually is. The SIA is responsible for protecting the organ
Publish At:2017-03-08 04:55 | Read:594 | Comments:0 | Tags:Security Intelligence & Analytics IBM X-Force Exchange Secur

Dridex’s Cold War: Enter AtomBombing

IBM X-Force discovered that Dridex, one of the most nefarious banking Trojans active in the financial cybercrime arena, recently underwent a major version upgrade that is already active in online banking attacks in Europe. A few weeks ago, our cybercrime labs detected a new major version of the Dridex banking Trojan, Dridex v4. The updated code features a ne
Publish At:2017-03-01 00:05 | Read:1069 | Comments:0 | Tags:Advanced Threats Banking & Financial Services Fraud Protecti

Can You Inoculate Your Organization Against Cybercrime?

In the natural world, new viral threats arise and existing viruses evolve to defeat our defenses. Just look at the flu — during the 2015 to 2016 flu season, people around the globe were fighting strains out of Switzerland and Phuket. This year, everyone’s worried about new flu varieties from California, Hong Kong and Brisbane. That’s why we get a
Publish At:2017-02-20 13:10 | Read:790 | Comments:0 | Tags:Health Care Security Intelligence & Analytics himss IBM X-Fo

Bringing the Power of Watson and Cognitive Computing to the Security Operations Center

Today, the average enterprise security operations center (SOC) is crushed under the burden of an estimated 200,000 pieces of security event data per day, according to IBM research. However, only a tiny percentage of those events require immediate action. Because alerts lack context, security teams must treat each equally. That means the average enterprise wa
Publish At:2017-02-13 15:10 | Read:684 | Comments:0 | Tags:Cognitive Network & Endpoint Security Intelligence & Analyti

Overcoming the Security Side-Eye: Making Collaborative Threat Intelligence Work

The facial expression has many names: side-eye, skepticism, disbelief — the perfect, singular, arched eyebrow over a pair of glasses. Regardless of the name, it is one we have seen both digitally, virtually and in person when discussing collaborative threat intelligence. Yes, we can proclaim that the bad guys are working together and organized cybercrime is
Publish At:2017-02-10 13:10 | Read:565 | Comments:0 | Tags:Threat Intelligence Collaboration IBM X-Force Exchange Infor

Around the World With Zeus Sphinx: From Canada to Australia and Back

IBM X-Force researchers recently identified new infection campaigns delivering distinct Zeus Sphinx Trojan variants to online banking users in Canada and Australia. This is the first time our researchers have observed Sphinx campaigns with dedicated configurations targeting financial institutions in either of the two countries. We believe they are part of on
Publish At:2017-01-26 23:10 | Read:753 | Comments:0 | Tags:Banking & Financial Services Fraud Protection Malware Threat

Expanding Threat Intelligence in IBM X-Force Exchange

Like a journalist, a security analyst must check multiple sources for additional information to verify or invalidate an assumption. Until recently, this was a rather tedious task. An analyst would have to reference various threat intelligence sites, enter the observable information in question and merge that data back into the main view. According to our res
Publish At:2017-01-20 01:20 | Read:904 | Comments:0 | Tags:Threat Intelligence IBM X-Force Exchange Threat Sharing X-Fo

Turn Scrap Paper Into Security Investigations With IBM X-Force Threat Intelligence

Written by Stefan Walter, Front-End Developer, IBM Security. According to a recent study from Enterprise Strategy Group (ESG), nearly one-third of organizations have trouble operationalizing threat intelligence despite the plethora of sources of threat data. Open standards have helped tremendously in the effort to incorporate threat intelligence into existin
Publish At:2016-12-15 07:35 | Read:953 | Comments:0 | Tags:Threat Intelligence X-Force Research Collaboration IBM X-For

Save Time by Accessing Multiple Threat Intelligence Streams at Once

We live in a world of information overload, where an incredible 2.5 quintillion bytes of data are created every day. Humans can only process a fraction of that information. Security analysts, responsible for maintaining the security of the company for which they work, must meet specific requirements regarding the information they leverage in their investigat
Publish At:2016-12-09 03:45 | Read:1063 | Comments:0 | Tags:Threat Intelligence IBM X-Force Exchange X-Force X-Force Fea

TrickBot Redirection Attacks Launched in Canada

The TrickBot Trojan, which emerged in the wild only this summer, continues to widen its attack scope, spreading farther in its target geographies and developing new redirection attacks. The most recent additions to TrickBot’s redirection targets are three Canadian banks. According to IBM X-Force researchers following the TrickBot Trojan’s ongoing
Publish At:2016-11-23 19:05 | Read:1326 | Comments:0 | Tags:Advanced Threats Banking & Financial Services Fraud Protecti

Join the Era of Collaborative Defense: Share the Intelligence

It’s commonly said that “there’s no I in team.” That’s certainly a platitude cybercriminals take to heart since they behave like one big, global team in many ways. They collaborate together on a vast scale, sharing information about their intended victims, including their user IDs, passwords, personal information, social circles
Publish At:2015-12-08 11:45 | Read:682 | Comments:0 | Tags:Security Intelligence & Analytics Application Security IBM S

Practical Indicators of Compromise and X-Force Exchange

The “IBM X-Force Threat Intelligence Quarterly – 4Q 2015” includes an article discussing indicators of compromise (IoCs), titled “The Power of Indicators of Compromise for Incident Forensics.” They can also be known as observables since they are artifacts that one can observe within the system’s environment. As that article note
Publish At:2015-12-02 11:05 | Read:1358 | Comments:0 | Tags:IBM X-Force IBM X-Force Exchange Incident Forensics Indicato

Security: It’s Better When Done Together

When it comes to security, there are a lot of unknowns out there. Every day can bring a new and unexpected threat, and it’s generally best to be on your guard at all times. In a way, it’s similar to deep-sea diving in that every descent is an adventure. Security professionals have worries like: Where are my greatest vulnerabilities? Has anyone al
Publish At:2015-11-19 15:40 | Read:725 | Comments:0 | Tags:Security Intelligence & Analytics IBM X-Force Exchange Infor

Security On Demand: From Endpoint to Mainframe, Passing Through the Cloud

Co-authored by Domenico Raguseo. When we start talking about security, there are different aspects: We could keep the discussion at the academic level, explaining what an SQL injection is, learning what a watering hole is, discussing the most critical malware of the year and debating whether the mainframe is the strongest secure system currently available. O
Publish At:2015-11-13 15:25 | Read:756 | Comments:0 | Tags:CISO Cloud Security Cybersecurity IBM X-Force Exchange Infor

Comparing Different Tools for Threat Sharing

The Importance of Threat Intelligence Collecting threat intelligence data and determining how to process this data is getting more and more attention from security professionals who want to detect and quickly respond to security threats. This holds true not only for advanced persistent threats (APTs), but also for mainstream attacks. Threat sharing provides
Publish At:2015-10-07 14:05 | Read:627 | Comments:0 | Tags:IBM X-Force Threat Intelligence Advanced Persistent Threat (


Share high-quality web security related articles with you:)


Tag Cloud