The cloud market today is full of references to the API economy. This is certainly with merit since the capabilities of an application programming interface (API) open the doors to a world of new applications, services and products.

APIs exist for cloud platforms in every major industry, and security is no exception. The tight integration between security solutions that APIs can make possible helps to close intelligence gaps that attackers might otherwise slip through. APIs also commonly provide threat intelligence for security infrastructure that enhances efficacy, provides valuable context and reduces your time-to-know and time-to-act on current and emerging threats.

The API of the IBM X-Force Exchange platform has provided threat intelligence integration capabilities to other applications since its inception. During the platform’s relatively short history, the platform and its API have continued to evolve, with improvements evident in the depth and breadth of the original X-Force threat intelligence available. Within the collaboration portal and the API, X-Force Exchange now provides granular intelligence like Threat Indicators and Observables, to higher order content like Campaigns and Tools, Tactics and Procedures (TTPs). X-Force Exchange can deliver this range of threat intelligence via the API, using two major specifications that allow users to use the method that best suits their needs.

RESTful API Support

Probably the most common method for accessing an API today is through a RESTful architectural interface that provides access to data in a reliable, scalable and simple manner. X-Force Exchange does this while providing threat intelligence information in JSON notation.

Users who are already familiar with this technology or have proprietary systems that can easily leverage a RESTful API would benefit quickly from this method. In addition, IBM has made the X-Force Exchange Node SDK available to help users get started with their integrations.

STIX/TAXII Support

X-Force Exchange also supports STIX and TAXII standards to allow for interoperability and automated machine-to-machine (M2M) exchange of threat intelligence. The adoption of these standards is where the true value of threat intelligence sharing really shines: It provides the ability for users to share information across different tools while abstracting away all the details of how threat intelligence information is captured, processed and exchanged across different platforms. These standards are gaining popularity across the spectrum of users and companies. Check Point Software Technologies, Soltra, Verisign, the United States Department of Defense (DoD) and many more organizations are actively involved in the evolution and promotion of STIX and TAXII via the OASIS IT standards consortium as the de facto standard for automated M2M threat intelligence exchange.

Threat Intelligence Use Cases

Over the last year, we’ve seen the X-Force Exchange API gain significant traction across a number of different use cases. The use cases commonly represent users interested in programmatically obtaining X-Force data to provide a new source of threat intelligence to their security infrastructure and/or operations.

Where the use cases differ is across different user types and their goals for threat intelligence integration:

  • The security analyst aims to implement an additional source of threat intelligence for their security infrastructure. This infrastructure may contain threat detection devices, a SIEM or a data analytics platform.
  • The managed security services provider, operating a security operations center (SOC), wants to help analysts speed their investigations and prioritize threats so that responders address the most severe issues first, increasing the provider’s overall efficiency.
  • The software provider looks to integrate threat intelligence into their product in a way that provides additional value in their offerings to their clients. From reputation to risk analysis, there are many IBM business partners that create and offer applications that integrate X-Force threat intelligence.

Sign up for a free trial of the IBM X-Force Exchange

With the value of threat intelligence and APIs well established, X-Force is introducing a new offering: IBM X-Force Exchange Commercial API. This will allow users to access the same X-Force threat intelligence available on the platform using a commercially-licensed API option which enjoys increased quota, enhanced query options, full support and the ability to integrate and resell products containing IBM X-Force content. The X-Force threat intelligence commercial API satisfies all the use cases for enhancing a security product or platform, a team’s efficacy and efficiency in a SOC, or a third-party security offering.

Learn More

More from Threat Intelligence

Ongoing ITG05 operations leverage evolving malware arsenal in global campaigns

13 min read - As of March 2024, X-Force is tracking multiple ongoing ITG05 phishing campaigns featuring lure documents crafted to imitate authentic documents of government and non-governmental organizations (NGOs) in Europe, the South Caucasus, Central Asia, and North and South America. The uncovered lures include a mixture of internal and publicly available documents, as well as possible actor-generated documents associated with finance, critical infrastructure, executive engagements, cyber security, maritime security, healthcare, business, and defense industrial production. Beginning in November 2023, X-Force observed ITG05…

CVE-2023-20078 technical analysis: Identifying and triggering a command injection vulnerability in Cisco IP phones

7 min read - CVE-2023-20078 catalogs an unauthenticated command injection vulnerability in the web-based management interface of Cisco 6800, 7800, and 8800 Series IP Phones with Multiplatform Firmware installed; however, limited technical analysis is publicly available. This article presents my findings while researching this vulnerability. In the end, the reader should be equipped with the information necessary to understand and trigger this vulnerability.Vulnerability detailsThe following Cisco Security Advisory (Cisco IP Phone 6800, 7800, and 8800 Series Web UI Vulnerabilities - Cisco) details CVE-2023-20078 and…

X-Force data reveals top spam trends, campaigns and senior superlatives in 2023

10 min read - The 2024 IBM X-Force Threat Intelligence Index revealed attackers continued to pivot to evade detection to deliver their malware in 2023. The good news? Security improvements, such as Microsoft blocking macro execution by default starting in 2022 and OneNote embedded files with potentially dangerous extensions by mid-2023, have changed the threat landscape for the better. Improved endpoint detection also likely forced attackers to shift away from other techniques prominent in 2022, such as using disk image files (e.g. ISO) and…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today