Ransomware Group Banks Millions; Cloudy Forecast Amid 40% Rise in Open-Source Malware in 2020; Social Distancing "Must Have" Tools Dominate Top Spoofed Brands

IBM Security today released the 2021 X-Force Threat Intelligence Index highlighting how cyberattacks evolved in 2020 as threat actors sought to profit from the unprecedented socioeconomic, business and political challenges brought on by the COVID-19 pandemic. In 2020, IBM Security X-Force observed attackers pivoting their attacks to businesses for which global COVID-19 response efforts heavily relied, such as hospitals, medical and pharmaceutical manufacturers, as well as energy companies powering the COVID-19 supply chain.

Read more ...

New IBM study shows nearly 60% of school staff are unprepared for cybersecurity threats - lack of training, awareness, budget and virtual learning identified as major issues

IBM today announced in-kind grants valued at $3 million to help strengthen cybersecurity in schools. These grants will be awarded to six school districts in the United States to sponsor teams of IBMers to help them proactively prepare for and respond to cyberattacks. Services will be delivered by teams deployed via IBM's Service Corps Program. The grant is being announced following a December alert from the FBI warning that nearly 60% of reported ransomware incidents between August and September 2020 involved K-12 schools, a 29% jump from the months prior.

Read more ...

Vulnerability management and threat assessment solutions build on existing suite to give organizations end-to-end infrastructure protection

HelpSystems announced today the acquisition of Digital Defense, a leader in vulnerability management and threat assessment solutions. Digital Defense’s cloud-native vulnerability scanning engine gives organizations in healthcare, legal, financial services, and other industries the ability to proactively detect infrastructure security gaps and take effective remediation steps to safeguard against internal and external cyberthreats. As part of HelpSystems’ cybersecurity portfolio, Digital Defense joins Core Security and Cobalt Strike to establish a comprehensive, best-in-class security assessment toolkit.

Read more ...

Security today announced that it was recognized as a leader in The Forrester Wave: Security Analytics Platforms, Q4 2020 report. Released today, the report evaluated 11 of the top Security Analytic providers, with IBM ranking highest in the current offering category compared to other vendors, and Forrester noting that IBM is "building an open security platform on the cloud."

Read more ...

IBM announced today that the company has been recognized as a Leader in three market reports evaluating Managed Security Services Providers. Profiling IBM's strategies and capabilities in managed security services are:

  • "The Forrester Wave: Global Managed Security Services Providers, Q3 2020" by Forrester Research: IBM Security Services received the highest score in the strategy category and among the highest in the market presence category and second highest in the current offering category.
  • "The Forrester Wave: European Managed Security Services Providers, Q3 2020", by Forrester Research: IBM Security Services was top ranked in two categories – current offering and strategy with the highest score possible in the third-market presence.
  • "IDC MarketScape: Worldwide Managed Security Services 2020 Vendor Assessment" (Doc # US46235320, September 2020): IBM Security Services was cited for its key strengths as a global scale partner with local delivery capabilities able to address customer needs such as the journey to cloud, application security, threat intelligence and threat management operations.
Read more ...

New Service Translates Security Risk Exposure for Areas Like Cloud, M&A and Remote Work into Financial Terms

IBM Security today announced a new risk-based service designed to help organizations apply the same analytics used for traditional business decisions to cybersecurity spending priorities. IBM's new Risk Quantification Services creates risk assessments to help clients identify, prioritize and quantify security risk as they weigh decisions such as deploying new technologies, making investments in their business and changing processes.

Read more ...

- Combines IBM's premier technology consulting services with EY leading strategy and business consulting capabilities

- Provides clients with specialized hybrid cloud functionalities including Red Hat OpenShift, as well as IBM Watson, IBM Blockchain, 5G and edge computing technologies

- Dedicated EY professionals with broad experience across IBM's leading technologies to help solve significant client challenges

EY and IBM today announce an enhanced, global multi-year alliance designed to help organizations accelerate digital transformation and improve client outcomes, including leveraging the hybrid cloud capabilities of Red Hat OpenShift, as well as IBM Watson, IBM Blockchain and IBM's 5G and edge technologies. Together, IBM and EY professionals will focus on helping clients modernize and transform their businesses.

Read more ...

Raz-Lee Security has added a ransomware attack simulator to its iSecurity Anti-Ransomware. With this feature, customers can test how their systems would behave during ransomware attacks. Administrators can verify and fine-tune the protection that the product provides.

Ransomware usually runs from a PC. It attacks any data file it can access, including IBM i IFS files.

A few weeks ago, Sapiens, a software developer for insurance, with software for IBM i, was forced to pay a $250,000 ransom in Bitcoin. A published known Ransomware attack on an IBM i made 250,000 IFS files unusable, stopped normal work for a month and cost the organization $200,000 to get the decryption key.

“During this COVID-19 pandemic, ransomware and other cyber-attacks have increased, targeting healthcare, financial, and government organizations. Cybercriminals are looking to take advantage of this global crisis. Now more than ever, it is important to ensure that IT systems are safe,” says Shmuel Zailer, CEO, Raz-Lee Security.

The Anti-Ransomware attack simulator can simulate known ransomware such as Sodinokibi, Ryuk, CryptoLocker, or WannaCry. The attack simulator can also simulate unknown zero-day ransomware that criminals on the darknet are offering as “ransomware as a service”. The attack simulator runs from a PC. It installs quickly and can be reused repeatedly to test various conditions on the IBM i. Simulated attacks are completely safe, but the IBM i sees them as realistic ransomware attacks. With these combined capabilities, organizations can have confidence that their IBM i is well protected.

iSecurity Anti-Ransomware itself runs on the IBM i. Unlike antivirus software, which consumes a lot of CPU and can only report on the damage that an attack has caused, Anti- Ransomware consumes virtually zero resources. It stops ransomware attacks immediately when they start. It can disconnect the IBM i from the network, send an email, alert the SIEM, and shut down the attacking PC.

The new iSecurity Anti-Ransomware is now available. About iSecurity Anti-Ransomware

Anti-Ransomware is a completely independent product. It is part of the iSecurity Advanced Threat Protection (ATP) suite, which also includes Anti-Virus, an ICAP client for the Antivirus, and Object Integrity Validation.