checkAd

     954  0 Kommentare Cisco Annual Security Report Reveals Widening Gulf Between Perception and Reality of Cybersecurity Readiness

    SAN JOSE, CA--(Marketwired - Jan 20, 2015) - Cisco (NASDAQ: CSCO) -- The Cisco 2015 Annual Security Report released today, which examines both threat intelligence and cybersecurity trends, reveals that organizations must adopt an 'all hands on deck' approach to defend against cyber attacks. Attackers have become more proficient at taking advantage of gaps in security to evade detection and conceal malicious activity. Defenders, namely, security teams, must be constantly improving their approach to protect their organization from these increasingly sophisticated cyber attack campaigns. These issues are further complicated by the geopolitical motivations of the attackers and conflicting requirements imposed by local laws with respect to data sovereignty, data localization and encryption. 

    Attackers
    Cyber criminals are expanding their tactics and adapting their techniques to carry out cyber attack campaigns in ways that make it harder to detect and analyze. The top three trends last year that Cisco's threat intelligence has identified are:

    Anzeige 
    Handeln Sie Ihre Einschätzung zu Cisco Systems Inc.!
    Short
    51,60€
    Basispreis
    0,32
    Ask
    × 14,12
    Hebel
    Long
    45,63€
    Basispreis
    0,34
    Ask
    × 13,29
    Hebel
    Präsentiert von

    Den Basisprospekt sowie die Endgültigen Bedingungen und die Basisinformationsblätter erhalten Sie bei Klick auf das Disclaimer Dokument. Beachten Sie auch die weiteren Hinweise zu dieser Werbung.

    • Snowshoe Spam: Emerging as a preferred strike method, attackers are sending low volumes of spam from a large set of IP addresses to avoid detection, creating an opportunity to leverage compromised accounts in multiple ways.
    • Web Exploits Hiding in Plain Sight: Widely used exploit kits are getting dismantled by security companies in short order. As a result, online criminals are using other less common kits to successfully carry out their tactics -- a sustainable business model as it does not attract too much attention. 
    • Malicious Combinations: Flash and JavaScript have historically been insecure on their own, but with advances in security detection and defenses, attackers have adapted by deploying exploits which combine their respective weaknesses. Sharing exploits over two different files -- one Flash and one JavaScript -- can make it more difficult for security devices to identify and block the exploit and to analyze it with reverse engineering tools.

    Users
    Users are caught in the middle. Not only are they the targets, but end-users are unknowingly aiding cyber attacks. Throughout 2014, Cisco threat intelligence research revealed that attackers have increasingly shifted their focus from seeking to compromise servers and operating systems to seeking to exploit users at the browser and email level. Users downloading from compromised sites contributed to a 228% increase in Silverlight attacks along with a 250% increase in spam and malvertising exploits.

    Seite 1 von 3


    Diskutieren Sie über die enthaltenen Werte



    Verfasst von Marketwired
    Cisco Annual Security Report Reveals Widening Gulf Between Perception and Reality of Cybersecurity Readiness SAN JOSE, CA--(Marketwired - Jan 20, 2015) - Cisco (NASDAQ: CSCO) -- The Cisco 2015 Annual Security Report released today, which examines both threat intelligence and cybersecurity trends, reveals that organizations must adopt an 'all hands on …

    Schreibe Deinen Kommentar

    Disclaimer