IBM X-Force Incident Response and Intelligence Services (IRIS) researchers have been responding to and analyzing the MegaCortex ransomware since its emergence. MegaCortex’s rapid evolution is one of the ways by which it has adapted to its perpetrators’ goals. While malware does evolve over time, MegaCortex’s evolution has been especially speedy…
Read More
The walk-up music for the post-lunch keynote speaker sounded familiar, but it took me a minute before I figured it out: It was the Hot Dog Song from Disney Jr.’s Mickey Mouse Clubhouse. It may have been the most unique walk-up music I heard at any of the cybersecurity conferences…
Read More
As cloud infrastructures become widely adopted across many organizations, some are also moving their software projects to the cloud — specifically containerized environments. While this move brings agility and scale with it, a false assumption can also arise: “My applications are inside containers, so they are secure.” In reality, however,…
Read More
The need to achieve responsible enterprise security has taken center stage in enterprise IT management in recent years, precipitated by a deluge of public data breaches that damaged company reputations. However, lacking information on the most critical modern attack vectors, many organizations continue to rely solely on traditional virus scanning…
Read More