HomeServicesSchedule a briefingX-Force Threat Intelligence Index report 2026Research hub
Visit the research hub for the latest insights and analysis from X-Force Red hackersDownload the reportSchedule a discovery session with X-Force®Schedule a discovery session with X-ForceRegister for the webinarGet the X-Force Threat Intelligence Index 2026Read the Threat-Led Penetration Testing solution briefGlobal Lead, X-Force Adversary Services
Chris Thompson
Chris is the Global Lead of Adversary Services at IBM X-Force. He drives vision and strategic initiatives to ensure the team can simulate the most sophisticated threat actors on the planet, while driving new capability development and offensive research leveraging automation and AI.Operations Lead, X-Force Adversary Services
Patrick Fussell
As the Operations Lead, Patrick is responsible for the delivery of all X-Force Adversary Services engagements, bringing solid leadership experience to our team of senior operators, researchers, and offensive engineers.Offensive Tradecraft Lead, X-Force Adversary Services
Brett Hawkins
As Offensive Tradecraft Lead, Brett is responsible for ensuring the X-Force Adversary Services team can operate efficiently and effectively to a variety of sophistication levels and helps prioritize CNO tool development and research priorities.Senior Managing Security Consultant, X-Force Adversary Services
Ruben Boonen
Ruben is responsible for low-level research and advanced CNE tool development for the X-Force Adversary Services team, driving key strategic initiatives and research.Senior Managing Consultant, X-Force Adversary Services
Sanjiv Kawa
As a manager for X-Force Adversary Services, Sanjiv helps to ensure the team is operating to an opsec safe and efficient manner while pursuing advanced objectives. Sanjiv helps to drive offering strategy and delivery of managed red team services.Offensive Engineering Lead, X-Force Adversary Services
Shawn Jones
As Offensive Engineering Lead of X-Force Adversary Services, Shawn is responsible for guiding offensive engineering efforts by our large team of developers, driving forward our offensive tooling roadmap.Visit the research hubCost of a Data Breach Report 2025
Report reveals 97% of organizations that experienced an AI-related security incident lacked proper access controls.X-Force Threat Intelligence Index report 2026
Understand how threat actors are waging attacks, and how to proactively protect your organization.
Read the reportCloud Threat Landscape 2024
Get key insights and practical strategies for securing your cloud with the latest threat intelligence
Get the reportBlog
Weaponizing DCOM for NTLM authentication coercions
Imagine achieving comparable results without the need for an "advanced" payload or accessing LSASS, simply by “living off the land” and leveraging underutilized Component Object Model (COM) objects.Blog
IBM X-Force discovers new Sheriff Backdoor used to target Ukraine
IBM X-Force discovered a set of previously unknown malware (Sheriff backdoor) used in a cyber espionage attack against an entity within Ukraine’s defense sector in the first half of 2024.Blog
Fileless lateral movement with trapped COM objects
Component Object Model (COM) has been a cornerstone of Microsoft Windows development since the early 1990s and is still very prevalent in modern Windows operating systems and applications.Blog
Bypassing Windows Defender Application Control with Loki C2
Windows Defender Application Control (WDAC) is a security solution that restricts execution to trusted software. Since it is classified as a security boundary, Microsoft offers bug bounty payouts for qualifying bypasses, making it an active and competitive field of research.IBM X-Force Red Penetration Testing Services
Testing AI models, applications, networks, hardware, and personnel to uncover and fix vulnerabilitiesIBM X-Force Offensive Security Services
Penetration testing and adversary simulation services from industry-leading hackersIBM X-Force
With a deep understanding of how threat actors think, strategize and strike, our team knows how to prevent, detect, respond to, and recover from incidents so that you can focus on business prioritiesSubscribe todayMore newslettersRequest a briefingRegister nowFollow us on GitHub
智能索引记录
-
2026-03-07 04:55:57
综合导航
成功
标题:DJANGO UNCHAINED #4 DC
简介:• The adaptation of the screenplay from award-winning direct
-
2026-03-06 01:58:44
综合导航
成功
标题:Schaeffler Germany
简介:Schaeffler has been driving forward groundbreaking invention
-
2026-03-06 06:12:58
视频影音
成功
标题:《Živalski vrt》2015电影在线观看完整版剧情 - xb1
简介:Živalski vrt(2015)电影免费在线观看完整版剧情介绍,Živalski vrt主要演员阵容、上映时间、最新
-
2026-03-07 02:21:49
教育培训
成功
标题:小学五年级作文4篇(热门)
简介:在学习、工作或生活中,许多人都写过作文吧,作文根据写作时限的不同可以分为限时作文和非限时作文。相信很多朋友都对写作文感到
-
2026-03-07 02:18:54
教育培训
成功
标题:一件令我感动的事作文(精选26篇)
简介:在平时的学习、工作或生活中,大家一定都接触过作文吧,借助作文人们可以实现文化交流的目的。那么你知道一篇好的作文该怎么写吗