The Trickbot/Conti Crypters: Where Are They Now?

securityintelligence.com · Charlotte Hammond and Ole Villadsen · 2 years ago · research
quality 7/10 · good
0 net
Security | IBM Security and identity AI security What is adversarial machine learning? David Zax Multifactor authentication What is adaptive multifactor authentication (adaptive MFA)? Bryan Clark Security automation What is security automation? Derek Robertson, Annie Badman Data security What is bring your own key (BYOK)? Matthew Kosinski, Gregg Lindemulder Data privacy Data privacy guide to AI and machine learning While data privacy in general has long been a concern, the term “AI data privacy” acknowledges that the emerging technology of artificial intelligence brings with it new risks and privacy concerns. David Zax Security intelligence Episode 11 Become an expert on fundamental and emerging cybersecurity topics Most popular Data security Cybersecurity Ransomware Cyberattacks Most popular resources E-books Reports Webinars Case Studies In-depth e-books and guides E-Book AI for Business: Maximize AI ROI through smarter governance Discover the key benefits gained with automated AI governance for any AI - apps, models or agents and how to maximize the ROI for all your AI initiatives with the right set of frameworks and tools E-Book Data governance for data leaders This E-Book analyzes several topics related to data governance and privacy such as scalability, establishing and implementing organization-wide standards, and data lineage and traceability. E-Book How to choose the right AI foundation model Follow a simple 5 step performance framework and find out how to make smarter, safer AI model choices. E-Book AI that people trust is AI that people use Read this guide to better understand why AI is making security and governance matter more than ever and what are the barriers protecting and building trust for data and AI. Trends shaping AI, governance, and security Forrester Wave Prioritize your AI governance See why Forrester recognized IBM as a Leader for its watsonx.governance solution—helping enterprises manage AI risk, compliance, and trust at scale. Gartner TRiSM framework Build trust into every AI decision Gartner Market Guide for AI TRiSM outlines emerging solutions for AI trust, risk and security management to help organizations govern AI systems and manage associated risks. IDC report Unified AI Governance Enterprises looking to scale AI initiatives responsibly will require a strong AI governance platform. Read the full analysis and discover how IBM watsonx.governance can support your Al strategy. Cost of a Data Breach Close the AI oversight gap The 20th annual Cost of a Data Breach Report focuses on the promise and peril of AI, which is increasingly becoming a powerful tool for cyber criminals and our best defense against them. Learn directly from industry experts On-demand | Webinar Securing AI in 2026 — Approach for a Trustworthy and Resilient AI Future Join IBM and Wipro for an exclusive webinar exploring the evolving landscape of AI security — from emerging risks to proven frameworks that empower CISOs to lead confidently in this new era. On-demand | Webinar Critical Elements of AI Trust As organizations race to embrace AI for competitive advantage, they often overlook the core element of Trustworthy AI. The future of AI depends on how well we secure it today. On-demand | Webinar Securing AI Agents — Building Trust in the Era of Autonomous Systems Listen to IBM experts as we unpack real-world attack vectors, emerging frameworks, and actionable defense strategies for securing AI agents in enterprise environments. On-demand | Webinar Scale your AI securely Is your company struggling with siloed teams with their own set of tools and metrics, leading to duplicated efforts and missed opportunities? Find out how your security and governance teams can operate in sync. See how leaders are driving results with IBM Banco do Brasil Trust by design Embedding Governance into AI at Banco do Brasil Ferrari A new digital destination Engineering Scuderia Ferrari HP’s fan engagement strategy US Open Building a smarter business from the ground up World-class digital experiences for more than 14 million fans around the globe UFC AI-generated narratives UFC partners with IBM to streamline and scale insight generation for 40+ live events The Cost of a Data Breach What’s in the 2025 report—and what to know about security Report Cost of a Data Breach Report 2025 Technology explained 2025 Cost of a Data Breach: AI risks, shadow AI and solutions X-Force Cyber Frontlines: Mark Hughes Podcast | AI in Action AI to defend against AI-based cybersecurity threats X-Force Cyberattack magnet? Unyielding threats plague the industrial sector On-demand webinar Manage risk in AI deployments: Deep-dive into OWASP Top 10 for LLM Report IBM X-Force 2025 Threat Intelligence Index X-Force In the protobuf: Web browser artifacts using Google's data interchange format On-demand webinar Govern, secure and monitor AI in one unified experience Explainer What is threat detection and response (TDR)? Explainer What is network security? Explainer What is web security? Join over 100,000 subscribers Receive insights, research and expert views on AI, security, automation and data in the Think Newsletter. Subscribe today IBM X-Force Threat management Vulnerability assessment Threat intelligence Discover more in X-Force Threat management Hive0154 drops Toneshell and SnakeDisk Hive0154 wreaks havoc on Singapore and Thailand using a new Toneshell backdoor and SnakeDisk USB worm. Learn More Adversary simulation Cyber Frontlines: Dustin Heywood Threat intelligence QuirkyLoader: A new malware loader delivering infostealers and RATs Raymond Joseph Alfonso Security What being a cop taught me about stopping hackers Ryan Anschutz Threat management Dissecting the CastleBot malware-as-a-service operation Golo Mühr Threat intelligence Weaponizing reality: The evolution of deepfake technology Alexis Obeng Adversary simulation A look at the 'resource_prefetch_predictor_origin' table in Chromium browsers Jairo Hibaler News 2025 Cost of a Data Breach Report: Navigating the AI rush without sidelining security Limor Kessem Security Intelligence Podcast Listen to the latest cybersecurity news and in-depth conversations with practitioners in the field. Watch the latest episode 7 January 2026 | Episode 15 A new take on bug bounties, AI red teams and our New Year's resolutions 29 December 2025 | Interview 3 Why it costs so much to get hacked in America 23 December 2025 | Episode 14 Cybersecurity's year in review: ClickFix attacks, vibecoding vulnerabilities, shadow agents and more 17 December 2025 | Episode 13 AI browser bans and the top software flaws of 2025 10 December 2025 | Episode 12 React2Shell makes waves, WormGPT falls flat and the latest threat to your Gmail account 3 December 2025 | Episode 11 Your house might be a botnet, your devs are leaking secrets and poems are breaking your AI guardrails 28 November 2025 | Interview 2 Trawling the honeypot: What it's like to discover a new malware strain 26 November 2025 | Episode 10 The dark web job market thrives, AI fraud rings rise and it's holiday scam season 19 November 2025 | Episode 9 Anthropic stops AI spies, the new OWASP Top 10 and the rise of small-time ransomware 12 November 2025 | Episode 8 AI slop in cybersecurity, OT security fails and lessons from the Louvre heist 5 November 2025 | Episode 7 Android malware that acts like a person and AI agents that act like malware 31 October 2025 | Interview 1 How to break into an office: A social engineering expert talks physical security 28 October 2025 | Episode 6 Is ChatGPT Atlas safe? Plus: Invisible worms, ghost networks and the AWS outage 8 October 2025 | Episode 5 RIP Windows 10, automated code repair and battling the payroll pirates 1 October 2025 | Episode 4 How to scam an AI agent, DDoS attack trends and busting cybersecurity myths Videos Learn the fundamentals and trending topics in security from our explainer videos View the cloud security playlist 2025 Cost of a Data Breach: AI risks, shadow AI and solutions Jeff Crume breaks down key findings from the IBM 2025 Cost of a Data Breach report, exploring AI security risks, shadow AI, phishing attacks and IAM strategies. AI in cybersecurity Learn how AI acts as a force multiplier to help you address security threats more effectively. What is SOAR? In this video, Jeff "The Security Guy" explains the need to have a strategy and the right tools for handling security incidents, including so-called "black swan" events. Phishing Explained Security expert Jeff Crume explains the attackers' strategy, whether it's phishing, spearfishing or whaling—and how to avoid falling for their traps. The anatomy of an att&ck Understand the MITRE ATT&CK in terms of “tactics, techniques and procedures (TTPs)”, and “people, process and technology (PPTs)”, and how to defend against attacks. What Is SIEM? Sort through alerts with Jaqueline Lehmann using a SIEM system to correlate data from multiple sources and find accurate, high-fidelity alerts. Social engineering: How bad guys hack users Watch how Jeff Crume, IBM Distinguished Engineer, describes the many methods that bad guys/hackers use that you should know about so you can protect yourself. The power of AI: Security Security AI and automation technologies enable organizations to stay ahead of cyberthreats through faster incident detection and response. Never miss an update Think newsletter subscription