IBM X-Force Threat Intelligence Services  

Global security intelligence experts with industry-leading analysis to help you identify and anticipate the latest threats
Portrait of a Multiethnic QA Engineer Working on Finding and Fixing Bugs in a Product or Program Software Code Before the Launch
Understand how threat actors think, strategize and strike

IBM® X-Force® Threat Intelligence leverages a team of world-class intelligence analysts to help organizations understand how the threat landscape is changing and the latest techniques that threat actors employ. These analysts mine insights from malware reverse engineering, dark web research and vulnerability tracking to help you better secure your environments.

With a deep understanding of how threat actors think, strategize and strike, X-Force Threat Intelligence can help you prevent, detect, respond to and recover from incidents and focus on business priorities.

Schedule a discovery session with X-Force
Dig into the New Threats of 2026 with X-Force
Abstract digital artwork showing a smooth white sphere emerging from the right side, overlaid by narrow vertical bars that create a red-to-magenta glow fading into dark blue.

Armed with the insights of our 2026 X-Force Threat Intelligence Index report, our team can help you secure your business against cyber threats. We are offering briefings with our expert team of intelligence analysts to give you customized insights about your organization.

Register for the webinar Get the X-Force Threat Intelligence Index 2026
Benefits
Enrich your threat analysis

Aggregate your threat detection and response by using threat group profiles, malware analysis reports, malware detection rules and threat activity insights extracted from near real-time threat intelligence.

Optimize threat intelligence detection and sharing

Automate threat intelligence from internal and external data sources through an ecosystem of security tool integrations and open-source intelligence (OSINT) feeds to help your team detect and share threat data faster.

Combine expertise with threat intelligence solutions

Simplify threat intelligence management with help from security professionals who can design, build and operate an automated cyber threat platform that delivers up-to-the-minute threat data to stay ahead of attacks.

Capabilities Cyber exposure insights

Enable continuous discovery to manage your cyber exposure across the surface, deep and dark web. Incorporate both internal and third-party sources.

Read more
Malware reverse engineering  

Explore an in-depth description of how the malware functions, indicators of compromise, payloads, mutexes and processes.

 

Strategic threat assessment  

Examine threat attackers likely to target your organization, including their infection vectors, techniques and procedures.

 

 

We wanted to help the business community by providing threat intelligence, and we realized that we needed to automate that, and we knew we couldn't do it alone.
Joshua Belk Executive Director, LA Cyber Lab
Case Study
Woman presenting a slide about monthly budget
Los Angeles creates a first-of-its-kind cyber lab

To help protect the community in an increasingly digitized environment, the city of Los Angeles partnered with IBM to create a cyber sharing group that makes it easy to report online criminal activity. By pooling threat intelligence from trusted contributors, data can be converted into meaningful knowledge and decisive action to prevent cybercrime.

Read the case study
Meet our experts
Robert Gates
With over 13 years of experience, Rob continuously monitors, analyzes and interprets threat intelligence data from various sources, such as deep and dark web forums, vendor repositories, industry reporting and incident reports to identify and assess potential threats to an organization.
Chris Caridi
Chris Caridi
Chris brings over 13 years of experience to cybersecurity topics, providing value-add analysis for X-Force clients on strategic shifts in the cyber threat landscape. Chris has acted as a primary author for both the Cloud Threat Landscape Report and the X-Force Threat Intelligence Index.
Melissa Frydrych-Dean
Melissa Frydrych-Dean
With over 11 years of experience, Melissa supports global incident response engagements as well clients, identifying potential threats through the continuous monitoring and analysis of threat intelligence data from various sources. While Melissa has experience researching and reporting on a variety of threat actors, she has a specialized focus on threat activity originating from and targeting Latin America.
Kevin Henson
Kevin brings over 25 years of experience to the X-Force malware reverse engineering team, conducting both static and behavioral analysis on samples to deep dive into technical analysis of malware samples and produce actionable threat intelligence for X-Force clients.
Rene Martinez
Rene has over 18 years of experience in Software development with IBM, with his current focus on assisting X-Force intelligence analysts in cyber threat investigations, incident response support, and automating content distribution to clients. Rene has designed, implemented and deployed a catalog of cloud applications that include Dark Web and GitHub monitoring, Mitre ATT&CK assessments and indicator of compromise lookups.
Jeff Kuo
With 18 years of experience, Jeff analyzes publicly disclosed vulnerabilities, providing value-add descriptions for clients and calculating a CVSS score based on X-Force’s understanding of the threat. Jeff’s work helps clients understand the severity of vulnerabilities so they can develop an effective patch management posture.
Insights
  Understand how threat actors think, strategize and strike IBM® X-Force® Threat Intelligence leverages a team of world-class intelligence analysts to help organizations understand how the threat landscape is changing and the latest techniques that threat actors employ. These analysts mine insights from malware reverse engineering, dark web research and vulnerability tracking to help you better secure your environments.  With a deep understanding of how threat actors think, strategize and strike, X-Force Threat Intelligence can help you prevent, detect, respond to and recover from incidents and focus on business priorities.  Schedule a discovery session with X-Force • Warning: the link opens on a new tab • Information: Link is ok  Analyst report IBM named a leader in new IDC Marketscape Report  • Warning: the link opens on a new tab • Information: Link is ok Get the X-Force Cloud Threat Landscape Report • Warning: the link opens on a new tab • Information: Link is ok Cost of a Data Breach Report 2025 AI is transforming business but it’s also introducing risk. 97% of organizations that experienced an AI-related security incidents lacked proper access controls.  Are you covered?   Read the Cost of Data Breach report • Warning: the link opens on a new tab • Information: Link is ok  • Information: Alt-text: "Illustration of circular lines with color dots around it" • Information: File size — 112.94 KB Illustration of circular lines with color dots around it Benefits Enrich your threat analysis Aggregate your threat detection and response by using threat group profiles, malware analysis reports, malware detection rules and threat activity insights extracted from near real-time threat intelligence.  Optimize threat intelligence detection and sharing Automate threat intelligence from internal and external data sources through an ecosystem of security tool integrations and open-source intelligence (OSINT) feeds to help your team detect and share threat data faster.  Combine expertise with threat intelligence solutions Simplify threat intelligence management with help from security professionals who can design, build and operate an automated cyber threat platform that delivers up-to-the-minute threat data to stay ahead of attacks.  Capabilities Cyber exposure insights Enable continuous discovery to manage your cyber exposure across the surface, deep and dark web. Incorporate both internal and third-party sources.  Read more • Warning: the link opens on a new tab • Information: Link is ok - This link downloads a pdf Malware reverse engineering   Explore an in-depth description of how the malware functions, indicators of compromise, payloads, mutexes and processes.     Strategic threat assessment   Examine threat attackers likely to target your organization, including their infection vectors, techniques and procedures.        • Information: Experience Fragment detected Dig into the New Threats of 2026 with X-Force Armed with the insights of our X-Force 2026 Threat Intelligence Index report, our team can help you secure your business against cyber threats. We are offering briefings with our expert team of intelligence analysts to give you customized insights about your organization.  Schedule a no-cost briefing with an expert • Warning: the link opens on a new tab • Information: Link is ok  Read the report • Warning: the link opens on the same tab • Information: Link is ok  • Information: Alt-text: "Abstract digital artwork showing a smooth white sphere emerging from the right side, overlaid by narrow vertical bars that create a red-to-magenta glow fading into dark blue." • Information: File size — 543.52 KB Abstract digital artwork showing a smooth white sphere emerging from the right side, overlaid by narrow vertical bars that create a red-to-magenta glow fading into dark blue. “ We wanted to help the business community by providing threat intelligence, and we realized that we needed to automate that, and we knew we couldn't do it alone. ” Joshua Belk Executive Director, LA Cyber Lab Case Study Los Angeles creates a first-of-its-kind cyber lab To help protect the community in an increasingly digitized environment, the city of Los Angeles partnered with IBM to create a cyber sharing group that makes it easy to report online criminal activity. By pooling threat intelligence from trusted contributors, data can be converted into meaningful knowledge and decisive action to prevent cybercrime.  Read the case study • Warning: the link opens on a new tab • Warning: Broken experience found  • Information: Alt-text: "Woman presenting a slide about monthly budget" • Information: File size — 99.69 KB Woman presenting a slide about monthly budget Meet our experts • Information: Alt-text: "Robert Gates" • Information: File size — 127.26 KB Robert Gates Cyber Threat Intelligence Services Lead Robert Gates With over 13 years of experience, Rob continuously monitors, analyzes and interprets threat intelligence data from various sources, such as deep and dark web forums, vendor repositories, industry reporting and incident reports to identify and assess potential threats to an organization.  • Warning: the link opens on a new tab • Warning: External link found • Information: Link is ok - This link opens in a new tab • Information: Alt-text: "Chris Caridi" • Information: File size — 339.86 KB Chris Caridi Strategic Threat Analysis Lead Chris Caridi Chris brings over 13 years of experience to cybersecurity topics, providing value-add analysis for X-Force clients on strategic shifts in the cyber threat landscape. Chris has acted as a primary author for both the Cloud Threat Landscape Report and the X-Force Threat Intelligence Index.  • Warning: the link opens on a new tab • Warning: External link found • Information: Link is ok - This link opens in a new tab • Information: Alt-text: "Melissa Frydrych-Dean" • Information: File size — 426.88 KB Melissa Frydrych-Dean Adversary Investigations & Analysis • Warning: & identified, check for translation error  Melissa Frydrych-Dean With over 11 years of experience, Melissa supports global incident response engagements as well clients, identifying potential threats through the continuous monitoring and analysis of threat intelligence data from various sources. While Melissa has experience researching and reporting on a variety of threat actors, she has a specialized focus on threat activity originating from and targeting Latin America.  • Warning: the link opens on a new tab • Warning: External link found • Information: Link is ok - This link opens in a new tab • Information: Alt-text: "Kevin Henson" • Information: File size — 54.47 KB Kevin Henson Malware Reverse Engineering Lead Kevin Henson Kevin brings over 25 years of experience to the X-Force malware reverse engineering team, conducting both static and behavioral analysis on samples to deep dive into technical analysis of malware samples and produce actionable threat intelligence for X-Force clients.  • Warning: the link opens on a new tab • Warning: External link found • Information: Link is ok - This link opens in a new tab • Information: Alt-text: "Rene Martinez" • Information: File size — 56.19 KB Rene Martinez X-Force Threat Intelligence Development Senior Architect Rene Martinez Rene has over 18 years of experience in Software development with IBM, with his current focus on assisting X-Force intelligence analysts in cyber threat investigations, incident response support, and automating content distribution to clients. Rene has designed, implemented and deployed a catalog of cloud applications that include Dark Web and GitHub monitoring, Mitre ATT&CK assessments and indicator of compromise lookups. • Warning: & identified, check for translation error   • Warning: the link opens on a new tab • Warning: External link found • Information: Link is ok - This link opens in a new tab • Information: Alt-text: "Jeff Kuo" • Information: File size — 428.91 KB Jeff Kuo Vulnerability Intelligence Threat Analyst Jeff Kuo With 18 years of experience, Jeff analyzes publicly disclosed vulnerabilities, providing value-add descriptions for clients and calculating a CVSS score based on X-Force’s understanding of the threat. Jeff’s work helps clients understand the severity of vulnerabilities so they can develop an effective patch management posture.  • Warning: the link opens on a new tab • Warning: External link found • Information: Link is ok - This link opens in a new tab Insights • Information: Alt-text: "Abstract image of purple tiles from 2022 Threat Intelligence Index"
The latest X-Force Threat Intelligence research all in one place Visit the research hub
TII 2026
X-Force Threat Intelligence Index report 2026
Understand how threat actors are waging attacks, and how to proactively protect your organization.
Several circles with colored lines
Cloud Threat Landscape
Get key insights and practical strategies for securing your cloud with the latest threat intelligence
Two computer engineers working in a server room
Definitive Guide to Ransomware
Discover the latest trends and research on ransomware.
Related solutions IBM® X-Force®

With a deep understanding of how threat actors think, strategize and strike, our team knows how to prevent, detect, respond to and recover from incidents so that you can focus on business priorities.

Learn more about IBM X-Force
IBM® X-Force® Cyber Range

The IBM X-Force Cyber Range solution creates immersive simulations to guide your team through realistic breach scenarios. Practice how to respond and recover from enterprise-level cybersecurity incidents to build a stronger security culture in your organization.

Learn more about X-Force Cyber Range
IBM® Managed Security Services

As your trusted advisors, cybersecurity specialists help you address your security needs, from the simplest to the most complex, monitoring and managing security incidents 24x7x365. Our people, technology, facilities and processes are among the best in the world. 

Learn more about Managed Security Services
Subscribe to our monthly newsletters
 
Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.

 

Subscribe today More newsletters
Schedule a 1:1 X-Force briefing

Schedule a discovery session with our X-Force team to discuss your security challenges.

Request a briefing
Explore career opportunities

Join our team of dedicated, innovative people who are bringing positive change to work and the world. 

Register now