checkAd

     857  0 Kommentare Cisco 2017 Midyear Cybersecurity Report Predicts New "Destruction of Service" Attacks, Scale and Impact of Threats Grows

    CASABLANCA, MOROCCO--(Marketwired - Jul 20, 2017) - Cisco (NASDAQ: CSCO) -- The Cisco® 2017 Midyear Cybersecurity Report (MCR) uncovers the rapid evolution of threats and the increasing magnitude of attacks, leading researchers to forecast potential 'destruction of service' (DeOS) attacks which could eliminate organizations' backups and safety nets, required to restore systems and data after an attack. With the advent of the Internet of Things, key industries are bringing more operations online, increasing their attack surface and the potential scale and impact of these attacks.

    Recent attacks such as WannaCry and Nyetya show the rapid spread and wide impact of attacks that look like ransomware, but are actually much more destructive. These foreshadow what Cisco is calling Destruction of Service attacks, which can be severely more damaging than traditional attacks, leaving businesses with no way to recover. The Internet of Things continues to offer new opportunities for these attackers, and its security weaknesses, ripe for exploitation, will play a central role in enabling these campaigns with escalating impact. Recent IoT Botnet activity already suggests that some attackers may be laying the foundation for a wide-reaching, high-impact attack that could potentially disrupt the Internet itself.

    The good news for businesses is that since November 2015, Cisco decreased its median time-to-detection (TTD) from just over 39 hours to about 3.5 hours for the period from November 2016 to May 2017. This decrease in TTD is essential to limiting the impact of an attack and speeding recovery efforts to limit business disruptions.

    Threat Landscape - What's Hot and What's Not
    Cisco security researchers watched the evolution of malware during the first half of 2017 and identified shifts in the way adversaries are tailoring their delivery, obfuscation and evasion techniques. Specifically, Cisco saw these adversaries increasingly requiring the victim to take action to activate a threat, such as clicking on a link or opening a file; developing fileless malware that resides completely in memory and is harder to detect or investigate as it is wiped out when a device restarts, and relying on anonymized and decentralized infrastructure, such as a Tor proxy service, to obscure command and control activities.

    Seite 1 von 4



    Diskutieren Sie über die enthaltenen Werte




    Verfasst von Marketwired
    Cisco 2017 Midyear Cybersecurity Report Predicts New "Destruction of Service" Attacks, Scale and Impact of Threats Grows CASABLANCA, MOROCCO--(Marketwired - Jul 20, 2017) - Cisco (NASDAQ: CSCO) -- The Cisco® 2017 Midyear Cybersecurity Report (MCR) uncovers the rapid evolution of threats and the increasing magnitude of attacks, leading researchers to forecast …

    Schreibe Deinen Kommentar

    Disclaimer