March 4, 2016 By Pamela Cobb 2 min read

I had the pleasure of attending the IBM InterConnect conference in February, and my colleagues like to make fun of the fact that I plan my hotel stay so I strategically walk by a certain chocolate megastore on the Vegas Strip on my way to the conference. My passion for highlighting the great security research from IBM X-Force rivals my love of the combination of chocolate and peanut butter, so it’s a bonus I get to combine the two things at the InterConnect conference.

In 2015, we started integrating security research publications across the IBM Security division under the IBM X-Force name. After all, for over 20 years, the X-Force brand has stood for expert analysis and threat intelligence to educate and better protect clients. It’s with excitement that we are offering a two-part webinar series to highlight the latest trend research being published.

A New IBM X-Force Series

The upcoming “2015 Security by the Numbers: Trends and Insights From IBM X-Force” series will, at a macro level, discuss the recently released “2016 IBM X-Force Threat Intelligence Report,” highlighting trends on cybercrime, emerging attack types and how breaches of durable personally identifiable information (PII) are offering attackers inroads to corporate networks.

Later in the month, we invite you to take a deep dive on the 2016 IBM X-Force Cyber Security Intelligence Index, which examines the major threats that IBM’s own Security Services clients faced in 2015. This will help you better understand the current threat landscape by offering a detailed look at the volume of attacks, the industries most affected, the most prevalent types of attacks and attackers and the key factors enabling them.

Two Great Tastes that Taste Great Together

In both webinars, experts within IBM X-Force share their insights and recommendations on how to best protect your network and valuable digital assets. While financial gain is still a significant motivator for cybercriminals, it’s by no means the only one, as we see in both the macro industry trends and within our own client base.

Last year’s attackers branched out in a big way, inflicting physical damage and pilfering intellectual property and sensitive personal data, which they can, in turn, use to further infiltrate even bigger financial targets through social engineering.

Having these two publications under the IBM X-Force brand brings two great things together: the macro and micro look at the latest trends and the details on how they are affecting companies like yours.

Register for the IBM X-Force Webinar series

More from X-Force

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

Being a good CLR host – Modernizing offensive .NET tradecraft

14 min read - The modern red team is defined by its ability to compromise endpoints and take actions to complete objectives. To achieve the former, many teams implement their own custom command-and-control (C2) or use an open-source option. For the latter, there is a constant stream of post-exploitation tooling being released that takes advantage of various features in Windows, Active Directory and third-party applications. The execution mechanism for this tooling has, for the last several years, relied heavily on executing .NET assemblies in…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today