Tag: X-Force
-
Audio-jacking: Using generative AI to distort live audio transactions
The rise of generative AI, including text-to-image, text-to-speech and large language models (LLMs), has significantly changed our work and …
-
PixPirate: The Brazilian financial malware you can’t see
Malicious software always aims to stay hidden, making itself invisible so the victims can’t detect it. The constantly mutating PixPirate …
-
Exploiting GOG Galaxy XPC service for privilege escalation in macOS
Extending and automating NightHawk with DayBird 13 min read – NightHawk, MDSec’s commercial C2 product, has focused on operational …
-
Databases beware: Abusing Microsoft SQL Server with SQLRecon
Over the course of my career, I’ve had the privileged opportunity to peek behind the veil of some of the largest organizations in the …
-
X-Force certified containment: Responding to AD CS attacks
This post was made possible through the contributions of Joseph Spero and Thanassis Diogos. In June 2023, IBM Security X-Force responded to …
-
New ways to reduce the chances of ransomware attacks
Just this past week, ransom attacks have hit a major Spanish bank, a Canadian university and a legal software-as-a-service platform. So …
-
IBM finds defenders are becoming more successful in detecting and preventing ransomware
International Business Machines Corp.’s annual X-Force Threat Intelligence Index report released today finds that although …
-
Defending Education from Cyber Threat Attackers
Threat actors — and particularly ransomware attackers — have education institutions in their crosshairs. From Vice Society’s …
-
Manufacturing overtakes financial services as the most attacked industry
A new report from IBM Security released early Wednesday says manufacturing is feeling the brunt of cyberattacks as supply chain issues …
-
“Trusted Partner” in Cybersecurity: Cliché or Necessity?
I dislike cliches. I suspect I’m not alone in that, but the truth is I’m guilty of using them on occasion — and I’m probably not …
-
An Attack Against Time
When Liza Minnelli sang that famous tune, “Money makes the world go around,” she should have added one more word: …
-
This Chat is Being Recorded: Egregor Ransomware Negotiations Uncovered
Ransomware attacks are topping the charts as the most common attack type to target organizations with a constant drumbeat of attacks …
●●●