securityintelligence.com Open in urlscan Pro
2606:4700::6812:19f1  Public Scan

URL: https://securityintelligence.com/
Submission: On December 20 via api from JP — Scanned from JP

Form analysis 1 forms found in the DOM

GET /

<form id="search" class="search " method="GET" action="/" target="_top" tabindex="-1">
  <amp-autocomplete filter="prefix" src="https://securityintelligence.com/wp-content/themes/sapphire/app/jsons/suggestions.json" suggest-first="" submit-on-enter="" on="select:search.submit" tabindex="-1"
    class="i-amphtml-element i-amphtml-layout-container i-amphtml-built i-amphtml-layout" i-amphtml-layout="container" role="combobox" aria-haspopup="listbox" aria-expanded="false" aria-owns="38_AMP_content_">
    <input id="search__input" tabindex="-1" type="text" name="s" autocomplete="off" placeholder="What would you like to search for?" aria-label="Search" oninput="validateInput(this)" required="" dir="auto" aria-autocomplete="both" role="textbox"
      aria-controls="38_AMP_content_" aria-multiline="false">
    <div class="i-amphtml-autocomplete-results" role="listbox" id="38_AMP_content_" hidden=""></div>
  </amp-autocomplete>
  <button tabindex="-1" value="submit" type="submit" class="search__submit" aria-label="Click to search">
    <amp-img width="20" height="20" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/search.svg" alt="Search"
      class="i-amphtml-element i-amphtml-layout-responsive i-amphtml-layout-size-defined i-amphtml-built i-amphtml-layout" i-amphtml-layout="responsive"><i-amphtml-sizer slot="i-amphtml-svc" style="padding-top: 100%;"></i-amphtml-sizer><img
        decoding="async" alt="Search" src="https://securityintelligence.com/wp-content/themes/sapphire/images/search.svg" class="i-amphtml-fill-content i-amphtml-replaced-content"></amp-img>
    <span>Search</span>
  </button>
  <button tabindex="-1" value="reset" class="search__close" type="reset" aria-labelledby="search" on="tap:search.toggleClass(class='megamenu__open')" role="link">
    <amp-img width="14" height="14" layout="responsive" src="https://securityintelligence.com/wp-content/themes/sapphire/images/close.svg" alt="Close"
      class="i-amphtml-element i-amphtml-layout-responsive i-amphtml-layout-size-defined i-amphtml-built i-amphtml-layout" i-amphtml-layout="responsive"><i-amphtml-sizer slot="i-amphtml-svc" style="padding-top: 100%;"></i-amphtml-sizer><img
        decoding="async" alt="Close" src="https://securityintelligence.com/wp-content/themes/sapphire/images/close.svg" class="i-amphtml-fill-content i-amphtml-replaced-content"></amp-img>
  </button>
</form>

Text Content

SECURITY INTELLIGENCE

News Topics X-Force Podcast
News Topics Threat Research Podcast

Search
{{#articles}}


{{TITLE}}

{{/articles}} View All News

Application Security Artificial Intelligence CISO Cloud Security Data Protection
Endpoint
Fraud Protection Identity & Access Incident Response Mainframe Network Risk
Management
Intelligence & Analytics Security Services Threat Hunting Zero Trust
Infographic: Zero trust policy
Industries Banking & Finance Energy & Utility Government Healthcare
View All Topics
{{#articles}}


{{TITLE}}

{{/articles}} View More From X-Force

{{#articles}}


{{TITLE}}

{{/articles}} View All Episodes



News


TOPICS

All Categories Application Security Identity & Access Artificial Intelligence
Incident Response CISO Mainframe Cloud Security Mobile Security Data Protection
Network Endpoint Risk Management Fraud Protection Threat Hunting Security
Services Security Intelligence & Analytics
Industries Banking & Finance Energy & Utility Government Healthcare
X-Force Podcast


Exclusive

CISO December 11, 2024


ON HOLIDAY: MOST IMPORTANT POLICIES FOR REDUCED STAFF

On Christmas Eve, 2023, the Ohio State Lottery had to shut down some of its
systems because of a cyberattack. Around the same time, the Dark Web had a
“Leaksmas” event, where cyber criminals shared stolen information for free as…

Read more

Latest Articles
Data Protection December 20, 2024


HOW TO CRAFT A COMPREHENSIVE DATA CLEANLINESS POLICY

3 min read - Practicing good data hygiene is critical for today’s businesses.
With everything from operational efficiency to cybersecurity readiness relying
on the integrity of stored data, having confidence in your organization’s data
cleanliness policy is essential. But what does this involve, and…

Risk Management December 19, 2024


2024 ROUNDUP: TOP DATA BREACH STORIES AND INDUSTRY TRENDS

3 min read - With 2025 on the horizon, it’s important to reflect on the
developments and various setbacks that happened in cybersecurity this past year.
While there have been many improvements in security technologies and growing
awareness of emerging cybersecurity threats, 2024 was…

Risk Management December 19, 2024


BLACK FRIDAY CHAOS: THE RETURN OF GOZI MALWARE

4 min read - On November 29th, 2024, Black Friday, shoppers flooded online
stores to grab the best deals of the year. But while consumers were busy filling
their carts, cyber criminals were also seizing the opportunity to exploit the
shopping frenzy. Our system…

Cloud Security December 18, 2024


CLOUD THREAT LANDSCAPE REPORT: AI-GENERATED ATTACKS LOW FOR THE CLOUD

2 min read - For the last couple of years, a lot of attention has been placed on
the evolutionary state of artificial intelligence (AI) technology and its impact
on cybersecurity. In many industries, the risks associated with AI-generated
attacks are still present and…

More articles
NEWS

December 16, 2024

CISA and the FBI recently released a joint statement that the People’s...

Learn More Arrow right
POPULAR
CISO December 13, 2024


MAKING SMART CYBERSECURITY SPENDING DECISIONS IN 2025

4 min read - December is a month of numbers, from holiday countdowns to RSVPs
for parties. But for business leaders, the most important numbers this month are
the budget numbers for 2025. With cybersecurity a top focus for many businesses
in 2025, it…

Risk Management November 6, 2024


WHAT TELEGRAM’S RECENT POLICY SHIFT MEANS FOR CYBER CRIME

4 min read - Since its launch in August 2013, Telegram has become the go-to
messaging app for privacy-focused users. To start using the app, users can sign
up using either their real phone number or an anonymous number purchased from
the Fragment blockchain…

Incident Response December 9, 2024


HOW I GOT STARTED: INCIDENT RESPONDER

3 min read - As a cybersecurity incident responder, life can go from chill to
chaos in seconds. What is it about being an incident responder that makes people
want to step up for this crucial cybersecurity role? With our How I Got Started…

Latest Podcast
Season 3 |Episode 7
Cyber leaders: Stop being your own worst career enemy. Here’s how.
How do you transition from security SME to security leader? Learn how to
supercharge your cybersecurity career on this episode of Into the Breach with
special guest Brian Donovan, author of “Leadership is Changing the Game: The
transition from technical expert to leader.”
Now playing
Play podcast pause podcast 36:18

ALL Episodes Subscribe SoundCloud Spotify Apple Podcasts
Subscribe
Soundcloud Spotify Artboard 1 Apple Podcasts
Latest Articles
Latest Articles
Artificial Intelligence December 17, 2024


TESTING THE LIMITS OF GENERATIVE AI: HOW RED TEAMING EXPOSES VULNERABILITIES IN
AI MODELS

4 min read - With generative artificial intelligence (gen AI) on the frontlines
of information security, red teams play an essential role in identifying
vulnerabilities that others can overlook. With the average cost of a data breach
reaching an all-time high of $4.88 million…

News December 16, 2024


FBI, CISA ISSUE WARNING FOR CROSS APPLE-ANDROID TEXTING

3 min read - CISA and the FBI recently released a joint statement that the
People’s Republic of China (PRC) is targeting commercial telecommunications
infrastructure as part of a significant cyber espionage campaign. As a result,
the agencies released a joint guide, Enhanced Visibility…

CISO December 13, 2024


MAKING SMART CYBERSECURITY SPENDING DECISIONS IN 2025

4 min read - December is a month of numbers, from holiday countdowns to RSVPs
for parties. But for business leaders, the most important numbers this month are
the budget numbers for 2025. With cybersecurity a top focus for many businesses
in 2025, it…

More articles
Choose a Category
CISO Zero Trust Cloud Security Data Protection Identity & Access X-Force
Choose a Category CISO Zero Trust Cloud Security Data Protection Identity &
Access X-Force
Sponsored


IBM SECURITY X-FORCE THREAT INTELLIGENCE INDEX: EXPLORE THE TOP THREATS OF 2023.

In 2023, abusing valid credentials became the most common entry point into
victim environments with a 71% increase in volume year over year. Learn more.

Read the report

Featured by topic
News November 18, 2024


RESEARCH FINDS 56% INCREASE IN ACTIVE RANSOMWARE GROUPS

Any good news is welcomed when evaluating cyber crime trends
year-over-year. Over the last two years, IBM’s…

Risk Management November 15, 2024


CYBERSECURITY DOMINATES CONCERNS AMONG THE C-SUITE, SMALL BUSINESSES AND THE
NATION

Once relegated to the fringes of business operations, cybersecurity has evolved
into a front-and-center concern for…

Risk Management November 6, 2024


WHAT TELEGRAM’S RECENT POLICY SHIFT MEANS FOR CYBER CRIME

Since its launch in August 2013, Telegram has become the go-to messaging app for
privacy-focused users.…

Data Protection November 8, 2024


SPYAGENT MALWARE TARGETS CRYPTO WALLETS BY STEALING SCREENSHOTS

A new Android malware strain known as SpyAgent is making the rounds — and
stealing screenshots…

Threat Intelligence November 12, 2024


STRELA STEALER: TODAY’S INVOICE IS TOMORROW’S PHISH

As of November 2024, IBM X-Force has tracked ongoing Hive0145 campaigns
delivering Strela Stealer malware to…

News August 19, 2024


NATIONAL PUBLIC DATA BREACH PUBLISHES PRIVATE DATA OF 2.9B US CITIZENS

Billions of people’s data was published on the dark web around April 8, 2024 —
from…

News November 4, 2024


CYBERATTACK ON AMERICAN WATER: A WARNING TO CRITICAL INFRASTRUCTURE

American Water, the largest publicly traded United States water and wastewater
utility, recently experienced a cybersecurity…

Data Protection November 5, 2024


SKILLS SHORTAGE DIRECTLY TIED TO FINANCIAL LOSS IN DATA BREACHES

The cybersecurity skills gap continues to widen, with serious consequences for
organizations worldwide. According to IBM’s 2024…


















More topics


TOPIC UPDATES

Get email updates and stay ahead of the latest threats to the security
landscape, thought leadership and research.
Subscribe today

Analysis and insights from hundreds of the brightest minds in the cybersecurity
industry to help you prove compliance, grow business and stop threats.

Cybersecurity News By Topic By Industry Exclusive Series X-Force Podcast Events
Contact About Us
Follow us on social
© 2024 IBM Contact Privacy Terms of use Accessibility Cookie Preferences
Sponsored by si-icon-eightbarfeature

IBM web domains

ibm.com, ibm.org, ibm-zcouncil.com, insights-on-business.com, jazz.net,
mobilebusinessinsights.com, promontory.com, proveit.com, ptech.org, s81c.com,
securityintelligence.com, skillsbuild.org, softlayer.com, storagecommunity.org,
think-exchange.com, thoughtsoncloud.com, alphaevents.webcasts.com,
ibm-cloud.github.io, ibmbigdatahub.com, bluemix.net, mybluemix.net, ibm.net,
ibmcloud.com, galasa.dev, blueworkslive.com, swiss-quantum.ch,
blueworkslive.com, cloudant.com, ibm.ie, ibm.fr, ibm.com.br, ibm.co, ibm.ca,
community.watsonanalytics.com, datapower.com, skills.yourlearning.ibm.com,
bluewolf.com, carbondesignsystem.com
About cookies on this site Our websites require some cookies to function
properly (required). In addition, other cookies may be used with your consent to
analyze site usage, improve the user experience and for advertising. For more
information, please review your cookie preferences options. By visiting our
website, you agree to our processing of information as described in
IBM’sprivacy statement.  To provide a smooth navigation, your cookie preferences
will be shared across the IBM web domains listed here.

Accept all More options

Cookie Preferences