關於 cookie 的說明

本網站使用瀏覽器紀錄 (Cookies) 來提供您最好的使用體驗,我們使用的 Cookie 也包括了第三方 Cookie。相關資訊請訪問我們的隱私權與 Cookie 政策。如果您選擇繼續瀏覽或關閉這個提示,便表示您已接受我們的網站使用條款。

搜尋結果Search Result

符合「IBM」新聞搜尋結果, 共 582 篇 ,以下為 1 - 24 篇 訂閱此列表,掌握最新動態
IBM發布《2026年X-Force威脅情報指數報告》:基礎安全漏洞持續困擾企業,AI驅動攻擊正升級

香港2026年3月6日 /美通社/ -- 近日,IBM(紐交所代碼:IBM)發布《2026年X-Force威脅情報指數報告》。報告指出,網絡罪犯正以驚人速度利用基礎安全漏洞,而人工智能工具的興起更進一步加劇此趨勢,協助攻擊者以前所未有的速度偵測系統漏洞。IBM X-Force觀察到,針對公開應用的軟件及系統程式發動的攻擊激增44%,主因是身份驗證控制缺失,以及AI驅動的漏洞偵測技術普及。 IBM X-Force Threat Intelligence Index 2026 報告主要亮點如下: 活躍的勒索軟件及敲詐集團數目按年激增49%,反映攻擊生態正走向碎片化;與此同時,公開披露的受害個案數目亦上升約12%。 針對大型軟件供應鏈及第三方服務商的重大安全漏洞,自2020年以來增長近四倍,攻擊者越來越多將目標鎖定軟件開發與部署環境,以及SaaS集成環境。 漏洞利用成為首要攻擊途徑,佔X-Force 2025年處理安全事件總數的40%。 IBM網絡安全服務全球管理合夥人Mark Hughes表示:「攻擊者並非研發全新攻擊手法,而是透過人工智能加速攻擊流程。」他補充:「核心問題仍舊存在:企業資源緊絀,軟件漏洞層出不窮。」現今的關鍵差異在於攻擊速度——由於不少漏洞無需憑證即可被利用,攻擊者能跳過人工干預環節,直接由掃描階段進入攻擊執行階段。安全領袖必須轉變思維,採取更積極的防禦策略,透過智能驅動的威脅偵測與回應技術,在威脅升級前識別並封堵漏洞。 AI身份安全問題日益嚴峻 2025年,資訊竊取類惡意軟件導致逾30萬個ChatGPT憑證外洩,可見企業內AI平台面臨的憑證風險,已與其他核心SaaS解決方案處於同一水平。 聊天機械人憑證外洩,不單帶來賬戶被盗風險,更牽涉AI獨有的安全問題。攻擊者可利用被盗憑證操縱AI輸出結果、竊取對話中的敏感數據,或注入惡意提示指令。這突顯企業急需全面評估內部AI應用狀況,並強制執行強式身份驗證及條件式訪問控制。 AI降低勒索軟件攻擊門檻 X-Force發現,2025年活躍的勒索軟件集團數目按年增加49%,主因是大批規模更小、流動性更高的運營者湧現;這類團體發動的攻擊次數不多,令追蹤及溯源難度大增。而攻擊門檻降低更是加劇此趨勢的關鍵:威脅行為者不斷重複使用外洩工具、依循成熟攻擊手法,並越來越多利用AI實現操作自動化。隨著多模態AI模型日趨成熟,X-Force預計,攻擊者將能自動化執行偵察等複雜任務,甚至發動AI驅動的勒索軟件攻擊,令威脅演進速度更快、適應性更強。 供應鏈攻擊壓力持續積聚 X-Force發現,自2020年以來,針對大型供應鏈或第三方服務商的重大入侵事件增長近四倍,主因是攻擊者利用了開發工作流與SaaS集成中的信任關係,以及CI/CD自動化環節的漏洞。隨著AI驅動的編碼工具加速軟件開發,同時亦可能引入未經充分審核的程式碼,X-Force預計2026年軟件供應鏈及開源生態將面臨更大的安全壓力。 此類攻擊增多,亦因具國家背景的攻擊者與純粹受經濟利益驅動的黑客集團之間的界線日益模糊。隨著攻擊戰術與技術在暗網論壇傳播,加上AI技術簡化了偵察及漏洞利用流程,不少以往僅國家級行為者掌握的技術,如今亦被逐利團體採用。 2026年報告其他重要發現: AI加速攻擊者的攻擊生命週期:攻擊者正利用AI加快研究速度、分析海量數據,並實時調整攻擊路徑。 基礎安全措施依然薄弱:X-Force Red滲透測試團隊發現,企業在憑證安全及軟件配置方面長期存在漏洞,其中訪問控制配置錯誤是攻擊中最常見的突破口。 製造業連續第五年成為最高危行業:該行業佔X-Force處理安全事件的27.7%,當中數據盜竊是最常見的攻擊目的。 北美首次成為受攻擊最嚴重地區:北美地區佔X-Force處理安全事件總數的29%,高於2024年的24%,六年來首度登頂。 更多資源: 閱讀完整《2026年IBM X-Force威脅情報指數報告》:https://www.ibm.com/reports/threat-intelligence  登記參加美國東部時間3月17日上午11時舉行的IBM X-Force威脅情報指數2026網上研討會:https://ibm.webcasts.com/starthere.jsp?ei=1752695&tp_key=82427e577a  聯絡IBM X-Force團隊,獲取針對報告結果的定制化分析:https://www.ibm.com/forms/mkt-15072  關於IBM IBM 是全球領先的混合雲、人工智能及企業服務提供商,幫助超過 175 個國家和地區的客戶,從其擁有的數據中獲取商業洞察,簡化業務流程,降低成本,並獲得行業競爭優勢。金融服務、電信和醫療健康等關鍵基礎設施領域的數千家政府和企業實體依靠 IBM 混合雲平台和紅帽 OpenShift 快速、高效、安全地實現數字化轉型。IBM 在人工智能、量子計算、行業雲解決方案和企業服務方面的突破性創新為我們的客戶提供了開放和靈活的選擇。對企業誠信、透明治理、社會責任、包容文化和服務精神的長期承諾是 IBM 業務發展的基石。瞭解更多信息,請訪問: www.ibm.com/ 查詢更多本地資訊,請訪問IBM香港新聞間:https://hongkong.newsroom.ibm.com/  傳媒查詢: 崔守峯 shou.feng.cui@ibm.com   IBM Corporation logo.  

文章來源 : PR Newswire 美通社 發表時間 : 瀏覽次數 : 533 加入收藏 :
IBM and University Researchers Create a Never-Before-Seen Molecule and Prove its Exotic Nature with Quantum Computing

- Published today in Science, the discovery marks the creation and observation of the first molecule with a half-Möbius electronic topology.- It shows how quantum computers can directly contribute to understanding complex molecular behavior. YORKTOWN HEIGHTS, N.Y., March 6, 2026 /PRNewswire/ -- An international team of scientists from IBM (NYSE: IBM), The University of Manchester, Oxford University, ETH Zurich, EPFL and the University of Regensburg have created and characterized a molecule unlike any previously known — one whose electrons travel through its structure in a corkscrew-like pattern that fundamentally alters its chemical behavior. Published today in Science, it is the first experimental observation of a half-Möbius electronic topology in a single molecule. Dyson orbital for electron attachment, calculated using quantum hardware. Credit: IBM and the University of Manchester To the scientists' knowledge, a molecule with such topology has never before been synthesized, observed, or even formally predicted. Understanding this molecule's behavior at the electronic structure level required something equally fundamental: a high fidelity quantum computing simulation. The discovery advances science on two fronts. For chemistry, it demonstrates that electronic topology — the property governing how electrons move through a molecule — can be deliberately engineered, not merely found in nature. For quantum computing, it is a concrete demonstration of a quantum simulation doing what it was designed to do: representing quantum mechanical behavior directly, at the molecular scale, to produce scientific insight that would otherwise have remained out of reach.  "First, we designed a molecule we thought could be created, then we built it, and then we validated it and its exotic properties with a quantum computer," said Alessandro Curioni, IBM Fellow, Vice President, Europe and Africa, and Director of IBM Research Zurich. "This is a leap towards the dream laid out by renowned physicist Richard Feynman decades ago to build a computer that can best simulate quantum physics and a demonstration where, as he said, 'There's plenty of room at the bottom.' The success of this research signals a step towards this vision, opening the door for new ways to explore our world and the matter within it." A Never-Before-Seen Molecule The molecule, with the formula C₁₃Cl₂, was assembled atom-by-atom at IBM from a custom precursor synthesized at Oxford University, with individual atoms removed one at a time using precisely calibrated voltage pulses under ultra-high vacuum at near-absolute-zero temperatures. Experiments with scanning tunneling and atomic force microscopy, both techniques pioneered at IBM, combined with quantum computing to reveal an electronic configuration with no counterpart in chemistry's existing record: an electronic structure that undergoes a 90-degree twist with each circuit, requiring four complete loops to return to the starting phase. This half-Möbius topology is qualitatively distinct from any previously known molecule and can be reversibly switched between clockwise-twisted, counterclockwise-twisted and untwisted states — demonstrating that electronic topology is not a property to be discovered, but one that can now be deliberately engineered under specific conditions. A Disruptive Scientific Tool: Quantum-Centric Supercomputing The scientists in this experiment created a molecule that had never existed. Now they had to figure out why it worked, a task which challenged conventional computers. The electrons within C₁₃Cl₂ interact in deeply entangled ways — each influencing all the others simultaneously. Modeling that behavior requires tracking every possible configuration of those interactions at once, requiring computational demands that grow exponentially and can quickly overwhelm classical machines. Quantum computers are different by nature because they operate according to the same quantum mechanical laws that govern electrons in molecules, and they can represent these systems directly rather than approximate them. They "speak" the same fundamental language as the matter they are built to study and that distinction, once largely theoretical, can now contribute to concrete scientific results. This capability offers tremendous potential for quantum computers to support real-world experimentation with quantum-centric supercomputing workflows. By integrating quantum processing units (QPUs), CPUs, and GPUs, quantum-centric supercomputing allows complex problems to be broken into parts that are orchestrated and solved according to each system's strengths — achieving what no single compute paradigm can deliver alone. Utilizing an IBM quantum computer within such a workflow, the team found helical molecular orbitals for electron attachment, a fingerprint of the half-Möbius topology. Moreover, simulation via quantum computing helped reveal the mechanism behind the formation of the unusual topology: a helical pseudo-Jahn-Teller effect. This achievement builds on IBM's long legacy in nanoscale science. The scanning tunneling microscope (STM) was invented at IBM in 1981, for which IBM scientists Gerd Binnig and Heinrich Rohrer were awarded the Nobel Prize in 1986. Its creation enabled researchers to image surfaces atom by atom. In 1989, IBM scientists developed the first reliable method for manipulating individual atoms. Over the past decades, the IBM team has extended these techniques to build and control increasingly exotic molecular structures. RESEARCHER QUOTES Dr. Igor Rončević, paper co-author, Lecturer in Computational and Theoretical Chemistry at Manchester University:"Chemistry and solid-state physics advance by finding new ways to control matter. In the second half of the 20th century, substituent effects were very popular. For example, researchers explored how the potency of a drug or the elasticity of a material changes if, for example, a methyl is replaced with chlorine. The turn of the century brought us spintronics, introducing electron spin as a new degree of freedom to play with, and transforming data storage. Today, our work shows that topology can also serve as a switchable degree of freedom, opening a new powerful route for controlling material properties. "The non-trivial topology of this molecule, and the exotic behavior of many other systems, arises from interactions between their electrons. Simulating electrons with classical computers is very hard – a decade ago we could exactly model 16 electrons, and today we can go up to 18. Quantum computers are naturally well-suited for this problem because their building blocks – qubits – are quantum objects, which mirror electrons. Using IBM's quantum computer, we were able to explore 32 electrons. However, the most exciting part is this is just the start. Quantum hardware is advancing rapidly, and the future is quantum." Dr. Harry Anderson, paper co-author, Professor of Chemistry at Oxford University:"It is remarkable that the Lewis structure of C₁₃Cl₂ already indicates it is chiral, as confirmed by the experiment and quantum chemical calculations. It is also amazing that the enantiomers can be interconverted by applying voltage pulses from the probe tip." Dr. Jascha Repp, paper co-author, Professor of Physics at the University of Regensburg:"I'm really excited to be part of a project where quantum hardware does real science, not just demos. It's fascinating that a tiny molecule can have such a complex electronic structure that is challenging to simulate classically, and is so twisted and strange that it almost twists your mind." For more about this research, please read the blog: Quantum simulates properties of the first-ever half-Möbius molecule, designed by IBM and researchers About IBM IBM is a leading global hybrid cloud and AI, and business services provider, helping clients in more than 175 countries capitalize on insights from their data, streamline business processes, reduce costs and gain the competitive edge in their industries. Thousands of governments and corporate entities in critical infrastructure areas such as financial services, telecommunications and healthcare rely on IBM's hybrid cloud platform and Red Hat OpenShift to affect their digital transformations quickly, efficiently and securely. IBM's breakthrough innovations in AI, quantum computing, industry-specific cloud solutions and business services deliver open and flexible options to our clients. All of this is backed by IBM's legendary commitment to trust, transparency, responsibility, inclusivity and service. For more information, visit https://research.ibm.com. Media Contact: Erin AngeliniIBM CommunicationsEdlehr@us.ibm.com Dave MosherIBM Researchdave.mosher@ibm.com Left, a scanning tunneling microscopy image of the new half-Möbius molecule's electron orbital density; right, a simulated STM image of the molecule's orbital density, which was made using an IBM quantum computer.    

文章來源 : PR Newswire 美通社 發表時間 : 瀏覽次數 : 304 加入收藏 :
IBM 推出 AI 智能體驅動的 FlashSystem 全閃存產品組合,開啟「自主儲存」新時代

・三款全新企業級儲存系統 —— IBM FlashSystem 5600、7600 及 9600 —— 大幅提升儲存管理效率; ・FlashSystem.ai 將 AI 智能體作為協同管理員嵌入儲存陣列; ・第五代 FlashCore Module(FCM5)可於 1 分鐘內偵測勒索軟件,實現系統彈性與數據管理新突破。 香港2026年2月26日 /美通社/ -- IBM(紐約證券交易所代號:IBM)近日發布內置 AI 智能體的新一代閃存系統 IBM FlashSystem,開啟「自主儲存」(autonomous storage)新紀元。新一代 FlashSystem 透過內置 AI 智能體強化 AI 能力,實現持續數據保護、主動威脅分析及客製化復原建議,重新定義企業級 IT 彈性。藉助新一代 FlashSystem,客戶可將儲存系統轉變為全天候運作的智能層,在確保穩定與安全的同時,減少高達 90% 的儲存手動管理工作量。[1] IBM FlashSystem 全新產品組合包括: 三款全新閃存系統 —— IBM FlashSystem 5600、7600 及 9600。與上一代產品相比,數據效率提升 40%,進一步優化容量、空間與效能表現。[2] FlashSystem.ai:一套全新 AI 智能體,協助管理員管理、監控、診斷及修復整個數據路徑上的故障與風險。 第五代 FlashCore Module(FCM5)全閃存硬碟:提供「硬件加速」實時勒索軟件偵測、數據縮減、分析及營運功能,配備先進遙測技術,同時兼備大規模穩定低延遲表現。 隨着企業愈趨將 AI 工作流程整合至日常營運,AI 智能體可簡化 IT 團隊跨技術堆疊的工作。事實上,IBM 商業價值研究院報告顯示,76% 受訪高管表示,其所屬機構正開發、推行或擴展概念驗證項目(proof-of-concepts),透過自建 AI 智能體實現智能工作流程自動化。[3] 與此同時,IT 團隊仍面對數據急速增長、網絡威脅擴散及合規要求日趨嚴格等挑戰,亦令企業對智能、自主儲存方案的需求愈趨迫切。 IBM 儲存業務總經理 Sam Werner 表示:「新一代 IBM FlashSystem 將儲存提升至智能、全天候可用的層級,自主運作的 AI 智能體可在無人手介入下持續優化效能、安全性及成本。是次產品更新標誌着『自主儲存』時代正式展開,FlashSystem 將成為企業的 AI 策略夥伴,協助 IT 負責人確保每項業務運作都獲得最優化及安全的效能表現。」 新一代 FlashSystem 產品登場 作為 FlashSystem 系列過去六年來的重大更新,是次同步推出的三款產品可滿足多元業務需求: IBM FlashSystem 5600:於緊湊空間提供企業級儲存能力,單個 1U 系統可提供高達 2.5 PB 有效容量,為中端市場訂立更高儲存密度標準,並提供高達 260 萬 IOPS。超高密度 1U 設計特別適用於空間有限的環境,例如邊緣位置、遙距辦公室及小型數據中心。 IBM FlashSystem 7600:適合需要高效能及擴展性以應對業務增長的企業,單個 2U 系統可提供高達 7.2 PB 有效容量及高達 430 萬 IOPS。FlashSystem 7600 可處理大型虛擬環境、分析平台及整合式應用,滿足更大容量與更快反應時間需求。 IBM FlashSystem 9600:專為追求極致效能與海量擴展性的關鍵任務企業而設,單個 2U 系統可提供高達 11.8 PB 有效容量及高達 630 萬 IOPS。典型應用場景包括:銀行核心系統、ERP 平台,以及需要高速與高安全性的 AI 應用。與上一代相比,全新 FlashSystem 9600 透過 AI 與整合技術,將營運成本降低 57%。[4]與上一代相比,全新 FlashSystem 產品透過優化數據布局與整合,可減少 30% 至 75% 實體空間佔用,視型號而定。[5] FlashSystem 7600 與 9600 更可選配全新互動式 LED 面板,系統狀態一目了然,輕鬆實現監控與可視化管理。 當閃存儲存遇上 AI 搭載於最新一代 FlashSystem 的 FlashSystem.ai 平台,以無縫、自助式操作為客戶帶來 AI 驅動數據服務,自動處理以往需要人手執行的工作,避免人為失誤。FlashSystem.ai 將傳統靜態儲存轉化為自我優化的智能系統。該平台的 AI 模型以高質量數據訓練而成,包括先進遙測技術收集的數百億數據點及多年真實營運數據,每日可執行數千個自動決策,無需人手監督。 FlashSystem.ai 不只實現多個儲存管理環節自動化,更可持續學習、快速迭代。全新 AI 智能體功能可於數小時內適應應用行為,速度遠勝基於固定模板的系統。它可提出效能優化建議並解釋推理過程,同時因應管理員回饋調整推薦方案。FlashSystem.ai 透過 AI 生成、可解釋的操作推理,將審計與合規文件編制時間縮短一半。[6] 這些功能令 FlashSystem 可透過主動調校、智能分配工作負載(支援跨儲存設備,包括第三方儲存陣列的非破壞性數據遷移)運行客戶工作負載。 FlashCore Module 技術再升級 是次全新 FlashSystem 產品均內置第五代 FlashCore Module(FCM5),這款硬碟容量最高達 105TB,在效率與安全性上均有顯著提升,同時為 FlashSystem 帶來硬件加速分析能力,可對每個 I/O 進行複雜運算,快速偵測勒索軟件與異常狀況,同時確保系統效能不受影響。[7] 新一代 IBM FlashSystem 的 AI 模型威脅偵測功能,透過先進遙測收集的數百億數據點及多年真實營運數據訓練,可將誤報率控制於 1% 以下。[8] 該硬碟更可於 60 秒內完成 AI 驅動的勒索軟件偵測與警報,[9] 並在硬件層執行自主復原操作,令 IBM FlashSystem 成為市場上其中一款最具彈性的儲存產品。[10] IDC 全球基礎設施系統研究副總裁 Natalya Yezhkova 表示:「IBM FlashSystem 新增的強大 AI 能力為客戶帶來全新運作模式,以自動化方式優化企業業務在 IBM 儲存系統內的布局,同時強化系統安全、主動符合合規要求。這些功能讓企業透過自適應 SLA 快速回應不斷變化的業務需求,無需為 IT 管理員增添額外負擔。」 Istanbul Pazarlama A.S. 商務拓展負責人 Nezih Boyacioglu 表示:「三年多前,IBM 已開始以『彈性』作為核心能力重塑儲存版圖,例如 Safeguarded Copy 及內置異常偵測等創新技術。儲存不再只講容量與效能,而是從源頭保護數據。如今當業內其他廠商終於開始實踐這願景時,IBM 已邁入下一階段。透過 FlashSystem.ai,我們正從『內置保護』走向『普及智能』。這不只是更快的硬碟,更是將專業知識與可自主學習、適應並提供無憂運作的儲存系統相結合。」 此外,IBM 技術全生命周期服務(Technology Lifecycle Services)可提供 AI 賦能的系統監控、基於 Call Home 的自動化問題偵測、預先程式碼健康檢查,以及優先處理關鍵問題的支援服務,協助客戶識別並處理潛在停機風險,做到防患於未然。 全新 FlashSystem 產品組合將於 2026 年 3 月 6 日全面上市。詳情請瀏覽:https://www.ibm.com/products/flashsystem [1] 免責聲明:與在硬碟圖形用戶界面執行這些常規操作相比,FlashSystem.ai 可減少高達 90% 儲存管理工作量。此聲明基於實驗室受控環境下,對搭載 FlashSystem.ai 之最新一代 FlashSystem 型號(5600、7600、9600)與未搭載 FlashSystem.ai 之最新一代 IBM FlashSystem(5600、7600、9600)執行代表性常規操作(使用 Safeguarded Copy 及災難復原策略進行多卷配置)的內部、基於任務評估。實際結果因環境、整合狀況、策略及用戶熟練程度而異。 [2] 免責聲明:此為使用最新一代 FlashSystem 型號(5600、7600、9600)時,單純壓縮與「重複數據刪除 + 壓縮」組合效果之比較說明,實際效果取決於數據集特性。壓縮比率與效能隨數據類型及工作負載而變化。效能數據來自內部實驗室測試,在可比延遲下比較 FlashSystem 9600 與 FlashSystem 9500 於 4 KB 隨機寫入配置下的表現。結果針對特定工作負載。 [3] IBM 商業價值研究院報告:《AI 智能體編排助力智能業務營運》 [4] 免責聲明:此為 FlashSystem 9600 與 FlashSystem 9500 在約 10 PB 可用容量下的建模比較。營運成本由管理人力、機架空間及能源平均分攤計算。輸入數據包括:採用 FlashSystem.ai 後管理效率提升約 50%,最新一代 FlashSystem 型號(5600、7600、9600)機架空間減少約 67%,耗電量降低約 25–30%。結果僅供說明;客戶實際效果因收費、工作負載、使用率、配置及策略而異。 [5] 免責聲明:重複數據刪除及壓縮數據來自使用 IBM 已出貨 FCM 及客戶系統的最新報告,該等系統運行時間由 2026 年 1 月起計介乎 3 個月至 7 年。結果針對所比較配置及硬碟容量。FS 9600 與 FS 9500 最大配置採用 14+2 奇偶校驗可用容量;與其他系統比較時節省效果或有差異。重複數據刪除功能已透過內部實驗室測試確認。 [6] 免責聲明:基於最新一代 FlashSystem 型號上的 FlashSystem.ai 功能,可自動收集配置、保護策略、操作歷史及風險狀態證據,支援審計準備工作。 [7] 免責聲明:此描述適用配備 FCM5 之最新一代 FlashSystem 型號,該型號使用硬件輔助分析計算每個 I/O 統計數據,並於陣列控制器進行實時模型評估。「不影響系統效能」反映測試工作負載下的內部量度結果。 [8] 免責聲明:誤報率效能基於以定期生產遙測數據訓練的模型,有關數據用於提升判別能力及減少最新一代 FlashSystem 型號(5600、7600、9600)的誤報。此適用於 2025 年第四季度發布的最新勒索軟件模型(3.3 版)。數據收集周期為 24 個月。誤報率於 3 個月內量度得出。 [9] 免責聲明:IBM 研究院內部實驗證明,勒索軟件開始加密程序後 1 分鐘內即可偵測。實驗於運行 4.1 韌體、配備 6 個 FCM 的 FlashSystem 5200 上進行,該 5200 系統搭載 8.6.3 GA 版本軟件。連接 5200 的主機運行搭載 XFS 檔案系統的 Linux。是次測試使用名為 WannaLaugh 的 IBM 勒索軟件模擬器。底層系統必須兼容 FCM4.1 及 8.6.3 GA 版本軟件方可達到所示效果。 [10] IDC Spotlight 報告:《對網絡、營運及數據彈性的業務需求,驅動閃存儲存系統 AI 能力》   關於IBM IBM 是全球領先的混合雲、人工智能及企業服務提供商,幫助超過 175 個國家和地區的客戶,從其擁有的數據中獲取商業洞察,簡化業務流程,降低成本,並獲得行業競爭優勢。金融服務、電信和醫療健康等關鍵基礎設施領域的數千家政府和企業實體依靠 IBM 混合雲平台和紅帽 OpenShift 快速、高效、安全地實現數字化轉型。IBM 在人工智能、量子計算、行業雲解決方案和企業服務方面的突破性創新為我們的客戶提供了開放和靈活的選擇。對企業誠信、透明治理、社會責任、包容文化和服務精神的長期承諾是 IBM 業務發展的基石。瞭解更多信息,請訪問: www.ibm.com/ 查詢更多本地資訊,請訪問IBM香港新聞間:https://hongkong.newsroom.ibm.com/  傳媒查詢: 崔守峯 shou.feng.cui@ibm.com  

文章來源 : PR Newswire 美通社 發表時間 : 瀏覽次數 : 451 加入收藏 :
IBM 2026 X-Force Threat Index: AI-Driven Attacks are Escalating as Basic Security Gaps Leave Enterprises Exposed

ARMONK, N.Y., Feb. 25, 2026 /PRNewswire/ -- IBM (NYSE: IBM) today released the 2026 X-Force Threat Intelligence Index, revealing that cybercriminals are exploiting basic security gaps at dramatically higher rates, now accelerated by AI tools that help attackers identify weaknesses faster than ever. IBM X‑Force observed a 44% increase in attacks that began with the exploitation of public-facing applications, largely driven by missing authentication controls and AI-enabled vulnerability discovery. IBM X-Force Threat Intelligence Index 2026 Some of the key highlights include: Active ransomware and extortion groups surged (49%) year over year, marking ecosystem fragmentation, while publicly disclosed victim counts rose roughly 12%. Large supply chain and third-party compromises nearly quadrupled since 2020, as attackers increasingly exploit environments where software is built and deployed or SaaS integrations. Vulnerability exploitation became the leading cause of attacks, accounting for 40% of incidents observed by X-Force in 2025. "Attackers aren't reinventing playbooks, they're speeding them up with AI," said Mark Hughes, Global Managing Partner for Cybersecurity Services, IBM. "The core issue is the same: businesses are overwhelmed by software vulnerabilities. The difference now is speed. With so many vulnerabilities requiring no credentials, attackers can bypass humans and move straight from scanning to impact. Security leaders need to shift to a more proactive approach, using agentic-powered threat detection and response to identify gaps and catch threats before they escalate." AI's Mounting Identity Problem Infostealer malware led to the exposure of over 300,000 ChatGPT credentials in 2025, signaling that AI platforms have reached the same credential risk as other core enterprise SaaS solutions. Compromised chatbot credentials create AI-specific risks beyond simple account access. Attackers can manipulate outputs, exfiltrate sensitive data or inject malicious prompts. This underscores the need to assess enterprise-wide AI adoption and enforce strong authentication, and conditional access controls. AI, Leaked Tooling Lower Barriers to Ransomware Ecosystem In 2025, X-Force observed a 49% increase in active ransomware groups compared to the prior year, as smaller, transient operators whose low volume campaigns complicate attribution. This trend is accelerated by collapsing barriers to entry as threat actors reuse leaked tooling, rely on established playbooks and increasingly tap AI to automate operations. As multimodal AI models mature, X-Force expects adversaries to automate complex tasks like reconnaissance and advanced ransomware attacks, driving faster-moving, more adaptive threats. Pressure on Supply Chains Poised to Grow X-Force identified a nearly 4X increase in large supply chain or third-party compromises since 2020, mainly driven by attackers exploiting trust relationships and CI/CD automation across development workflows and SaaS integrations. With AI-powered coding tools accelerating software creation, and occasionally introducing unvetted code, the pressure on pipelines and open‑source ecosystems is expected to grow in 2026. This rise is also attributed to the blurring line between nation-state and financially motivated actors. As tactics and techniques spread across underground forums, and AI streamlines reconnaissance and exploitation, techniques once reserved for nation-state actors are now being adopted by financially motivated groups. Additional findings from the 2026 report include: AI accelerating attacker lifecycle. Attackers are using AI to speed research, analyze large data sets and iterate on attack paths in real time. For example, North Korean IT worker schemes are using AI to scale operations, including AI-driven image manipulation for synthetic identities and translation tools to interact across global marketplaces. Security fundamentals still lacking. X-Force Red penetration tests reveal persistent weaknesses in credential hygiene and software configuration, with misconfigured access controls as the most common entry point for these engagements. Manufacturing tops the target list for the fifth year. The sector accounted for 27.7% of incidents observed by X-Force, with data theft being the most common. North America emerged as the most‑attacked region. Accounting for 29% of total cases observed by X-Force, and up from 24% in 2024, North America became the most attacked region for the first time in 6 years. Additional resources: Read the full IBM X-Force Threat Intelligence Index 2026. Sign up for the IBM X-Force Threat Intelligence 2026 webinar on March 17 at 11 am ET. Connect with the IBM X-Force team for a tailored review of the findings. Read more about the report's top findings in this blog. About IBMIBM is a leading provider of global hybrid cloud and AI, and consulting expertise. We help clients in more than 175 countries capitalize on insights from their data, streamline business processes, reduce costs and gain a competitive edge in their industries. Thousands of governments and corporate entities in critical infrastructure areas such as financial services, telecommunications and healthcare rely on IBM's hybrid cloud platform and Red Hat OpenShift to affect their digital transformations quickly, efficiently and securely. IBM's breakthrough innovations in AI, quantum computing, industry-specific cloud solutions and consulting deliver open and flexible options to our clients. All of this is backed by IBM's long-standing commitment to trust, transparency, responsibility, inclusivity and service. Visit www.ibm.com for more information. Media Contact:Michele BrancatiIBM CommunicationsMbrancati@ibm.com  

文章來源 : PR Newswire 美通社 發表時間 : 瀏覽次數 : 333 加入收藏 :
IBM Elects Ramon L. Laguarta to its Board of Directors

ARMONK, N.Y., Jan. 31, 2026 /PRNewswire/ -- The IBM (NYSE: IBM) board of directors has elected Ramon L. Laguarta to the board, effective March 1, 2026. IBM Corporation logo. Ramon L. Laguarta, 62, is the chairman and chief executive officer of PepsiCo. With a strong commitment to performance and leadership, Mr. Laguarta has led PepsiCo, a global food and beverage leader, since 2018. He has played a pivotal role in PepsiCo's portfolio and cultural transformation. Arvind Krishna, IBM chairman, president and chief executive officer, said: "We are pleased to have Ramon Laguarta join the IBM board of directors. Ramon's background, expertise and proven track record of leveraging technology to transform large organizations make him an ideal director to help steward IBM and deliver significant value to our shareholders." Under Mr. Laguarta's leadership, PepsiCo has evolved into a growth-driven, best-in-class organization. He has led a strategic, end-to-end transformation agenda, scaling technology across the enterprise, driving long-term value for the company. Prior to becoming CEO, Mr. Laguarta was president of PepsiCo, responsible for driving the company's corporate strategy. Throughout his career, he has held several executive positions and served as president of developing markets in Europe and CEO of Europe and Sub-Saharan Africa. He is a board member of the Business Roundtable. Born and raised in Barcelona, Mr. Laguarta holds an MBA from ESADE Business School in Spain and a Master of Management from Thunderbird School of Global Management. Contact:Tim Davidson914-844-7847tfdavids@us.ibm.com  

文章來源 : PR Newswire 美通社 發表時間 : 瀏覽次數 : 614 加入收藏 :
IBM推出IBM Enterprise Advantage服務 助企業大規模量產落實代理式AI

AI賦能的全新諮詢服務提供安全穩健的技術平台、統一共享標準及可重複應用的AI資產,助企業加速增長、驅動創新。 香港2026年1月22日 /美通社/ -- IBM 近日正式推出IBM Enterprise Advantage服務。這項業界首創的資產型諮詢服務,整合了經實戰驗證的AI工具與專業能力,協助企業快速構建、合規管治並大規模量產運營專屬定制的企業內部AI平台。 IBM推出IBM Enterprise Advantage服務 現時,企業可憑藉IBM Enterprise Advantage重構工作流程、打通AI與現有系統的對接環節、大規模擴展新型智能體應用,而且無須調整旗下雲服務供應商、AI模型或核心基礎設施——不論採用的是Amazon Web Services、Google Cloud、Microsoft Azure、IBM watsonx等主流雲平台,還是開源或閉源模型,企業均可基於現有技術投資無縫拓展業務。 IBM Enterprise Advantage匯集了IBM諮詢顧問的技術實力與行業洞察,其底層架構源自IBM內部AI驅動的交付平台——IBM Consulting Advantage。該平台已構建起日漸豐富的垂直行業AI智能體與應用生態,服務超過150個客戶項目,經實戰驗證最高可提升顧問工作效率達50%,助客戶更快收穫業務成果。 如今,IBM透過Enterprise Advantage服務,將這套經過實戰檢驗的方法論和技術能力開放予客戶,助其打造專屬AI平台,縱橫複雜的AI市場,釋放企業核心價值。 IBM Enterprise Advantage 以終身學習教育龍頭企業培生集團(Pearson)為例,該集團運用此項服務打造定制化AI驅動平台,透過「人類專業知識能力+智能體助手」的協同模式,提升日常工作效率,並強化數據驅動的決策能力。 某製造業企業依托Enterprise Advantage服務推進生成式AI戰略落實,具體舉措包括挖掘高價值應用場景、開展定向原型驗證,推動管理層就「大規模量產、平台優先」的核心戰略達成共識。基於這項解決方案,該客戶已透過多技術融合,在安全合規、可控可管的環境中完成AI助手的部署上線,為生成式AI在全企業範圍內的大規模量產推廣與深度應用奠定堅實基礎。 「眾多企業正積極佈局人工智能領域,但如何實現大規模量產的商業價值,仍是一大核心挑戰。」IBM高級副總裁兼IBM諮詢業務主管Mohamad Ali表示:「IBM早已在內部攻克諸多類似難題——憑藉人工智能變革內部運營模式,取得可量化的顯著成效,並由此形成一套經實戰驗證的實戰指南,助客戶邁向成功。Enterprise Advantage解決方案正是將這一框架賦能予客戶,透過整合專業人才能力、數碼員工及即開即用型AI資產,協助客戶信心滿滿地實現AI大規模量產部署,創造可見的實質效益。」 Enterprise Advantage服務現已正式上線,點擊此處可体验。 關於IBM IBM 是全球領先的混合雲、人工智能及企業服務提供商,幫助超過 175 個國家和地區的客戶,從其擁有的數據中獲取商業洞察,簡化業務流程,降低成本,並獲得行業競爭優勢。金融服務、電信和醫療健康等關鍵基礎設施領域的數千家政府和企業實體依靠 IBM 混合雲平台和紅帽 OpenShift 快速、高效、安全地實現數字化轉型。IBM 在人工智能、量子計算、行業雲解決方案和企業服務方面的突破性創新為我們的客戶提供了開放和靈活的選擇。對企業誠信、透明治理、社會責任、包容文化和服務精神的長期承諾是 IBM 業務發展的基石。瞭解更多信息,請訪問: www.ibm.com/查詢更多本地資訊,請訪問IBM香港新聞間:https://hongkong.newsroom.ibm.com/   傳媒查詢:崔守峯 shou.feng.cui@ibm.com    

文章來源 : PR Newswire 美通社 發表時間 : 瀏覽次數 : 590 加入收藏 :
2026 年 3 月 11 日 (星期三) 農曆正月廿三日
首 頁 我的收藏 搜 尋 新聞發佈