0 Results Found
            Back To Results
              Reports

              Threat Intelligence Executive Report 2017: Vol 1

              Review the events and trends from the information security world from November through December 2016

              Threat Intelligence provides the power to protect your organisation against emerging threats.

              The SecureWorks® Counter Threat Unit™ (CTU) research team analyses security threats and helps organisations protect their systems. During November and December 2016, CTU™ researchers identified lessons learned and observed notable developments in threat behaviors and the global threat landscape:

              • Weak and outdated software enabled breaches
                • Threat actors exploited a weak multi-factor authentication implementation and bypassed outdated antivirus software to breach organisations.
              • Threat actors leveraged legitimate features
                • To facilitate their activities in a compromised environment, threat actors used native system features rather than malware.
              • Threat groups targeted organisations for espionage
                • Government-sponsored threat groups updated their toolsets and conducted targeted espionage intrusions against networks in the technology, manufacturing, and defence verticals.
              • Shamoon wiper malware reemerged
                • Destructive malware reemerged that destroyed tens of thousands of devices in 2012.

              Conclusion:

              Given these sophisticated attacks and increasingly adaptable threat actors, CTU researchers encourage organisations to consider the lessons learned from these incidents when designing their security protections. While implementing security best practices could limit the likelihood and impact of many intrusions, understanding and addressing threat behaviors can help organisations anticipate and disrupt potential breaches.

              Like what you're reading ?
              Get instant access by completing the form below

              Select Role:

              • Board of Directors
              • CEO / CFO / COO
              • CISO / CSO
              • CIO / CTO
              • IT / IS / Security VP/Director
              • IT / IS / Security Manager
              • IT / IS / Security Staff
              • IT / IS / Non-Security
              • Risk / Legal / Compliance / Finance
              • Sales / Marketing
              • Press / Industry Analyst
              • Student

              Select Country:

              • Select an item

              Select State:

              • Select an item

              Select Annual Revenue:

              • > 1000
              • 501 - 999
              • < 500

              Select Industry:

              • Banking
              • Business Services
              • Credit Union
              • Education
              • Finance
              • Government
              • Health Care (Non-Hospital)
              • Heavy Industry
              • Hospitality
              • Hospitals
              • Insurance
              • Legal
              • Manufacturing
              • Media
              • Membership Organizations
              • Retail
              • Technology
              • Telecom
              • Transportation
              • Utilities
              • Other

              Current Security Environment?:

              • Managing In-House
              • Managing Externally (3rd Party)
              • Blended Model (In-house and 3rd Party)
              • Not sure

              Select Next Security Initiative Timeframe:

              • 0-3 months
              • 3-6 months
              • 6-12 months
              • 12-24 months

              Select Our Greatest Security Challenge:

              • Securing The Cloud
              • Assessing security posture
              • Optimizing Security Operations
              • Protecting critical assets
              • Meeting & maintaining compliance
              • Preventing a data breach
              • Access to actionable security intelligence
              • Access to security expertise
              • Preparing & responding to an incident

              Interested in learning more

              Currently Looking for Assistance With (Select all that Apply)

              Select Best time to call:

              • Early morning (8-10am)
              • Late morning (10am-12pm)
              • Early afternoon (12-3pm)
              • Late afternoon (3-5pm)

              SecureWorks News :

              Related Content