Threat Landscape Update

Slides:



Advertisements
Similar presentations
The Threat Landscape Jan Threat Report 2.
Advertisements

1© Copyright 2014 EMC Corporation. All rights reserved. Securing the Cloud Gintaras Pelenis Field Technologist RSA, the Security Division of EMC
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
7 Effective Habits when using the Internet Philip O’Kane 1.
Security for Today’s Threat Landscape Kat Pelak 1.
Latest Threats Against Mobile Devices Dave Jevans Founder, Chairman and CTO.
Symantec Security Intelligence Internet Security Threat Report Volume XVI June, 2011 Tiffany Jones Director – Programs and Strategy Symantec Public.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
Cyber Crimes.
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
INTRODUCTION & QUESTIONS.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
KASPERSKY INTERNET SECURITY multi-device  Average number of devices in households: 4.5  Consumer device diversity will continue to expand.
©2015 Check Point Software Technologies Ltd. 1 Website Watering Holes Endpoints are at risk in numerous ways, especially when social engineering is applied.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Centre of Expertise - Security Securing your business against cybercrime Or surely we do not have anything to worry about...do we?
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
CDAC ITS Security Awareness How to help your daily computer activities remain safe and sane.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
November 14, 2016 bit.ly/nercomp_defendingyourdata16
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Sophos Central for partners and customers: overview and new features
IBM 2015 Cyber Security Intelligence Index
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Ransomware 12:00 Juwan harris.
IBM 2016 Cyber Security Intelligence Index
Executive Director and Endowed Chair
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Journey to Microsoft Secure Cloud
Microsoft Ignite /2/2018 6:37 AM BRK2293
Cyber Security & IT: What’s Next?
Cisco 2017 Security Annual Report
Office 365 with confidence: security features for Office 365
Jon Peppler, Menlo Security Channels
Preparing for the cyber landscape of 2020
Cybersecurity Awareness
“CYBER SPACE” - THE UNDERGROUND ECONOMY
Threat Landscape for Data Security
Strong Security for Your Weak Link:
MISSION STRATEGIC DIRECTION
Internet Security Threat Status
Home Internet Vulnerabilities
David J. Carter, CISO Commonwealth Office of Technology
Secure once, run anywhere Simplify your security with Sophos
Introduction to Systems Security
Ransomware in Web Apps OWASP Singapore.
Protecting your data with Azure AD
Tom Murphy Chief Information Security Officer
Information Security – Sep 18
Information Protection
WJEC GCSE Computer Science
Security Trends and Threats Affecting Innovations in Technology
<offer name> with Microsoft 365 Business Secure Deployment
IP Addresses & Ports IP Addresses – identify a device on a network
Information Protection
Legal Informatics, Privacy and Cyber Crime
Defencebyte THE PERFECT SECURITY FOR YOUR COMPUTER.
Presentation transcript:

Threat Landscape Update Internet Security Threat Report (ISTR) 2019 volume 24 https://go.symantec.com/istr IETF 104, Monday 25th of March 2019, Prague Arnaud Taddei (Arnaud_Taddei@symantec.com) Candid Wueest (Candid_Wueest@symantec.com)

Cybercrime Trends – Focused on Profit FormJacking Cryptojacking activity remains at high levels with 3.5 million blocked events in Dec 2018 Over the course of 2018, total cryptojacking events dropped by 52% as cyptocurrency prices dropped by almost 90% Overall web attacks are up by 56% 1 in 10 URLs was malicious (1 in 16 in 2017) CryptoJacking Formjacking is the use of malicious JavaScript to transparently steal payment card information & PII from compromised websites On average 4,800 websites were compromised by formjacking attacks every month in 2018 We blocked 3.7M formjacking attacks in 2018 on endpoint devices Difficult to detect for end-users

Cybercrime Trends – Focused on Profit Ransomware 1 in 36 mobile devices had a high risk app installed Only 23.7% of Android phones run the latest major OS version. On IPhones 78.3% are on the newest major release Social media increasingly used to spread fake news/propaganda Smartphones Enterprise ransomware infections are up 12% Mobile ransomware infections are up 33% Overall ransomware infections were down by 20% as attackers moved to more lucrative activities -20% +12%

Attack Trends IoT and Cloud Internet of Things Attacks against AWS, Azure, Kubernetes, Docker, serverless applications and exposed API services increased At least 70 million records leaked from AWS S3 buckets in 2018 -> more data breaches Vulnerabilities in hardware chips & infrastructure place cloud services at risk: Meltdown, Spectre, RunC, SDN exploits Cloud Environment 75% of compromised devices were routers, followed by cameras 15% 5G connectivity will change the landscape with more directly connected devices Weak passwords & device exploits are most common attack vectors Used for DDoS, crypto jacking, ad-fraud, but other methods grow

Living off the Land and Supply Chain Attacks Attack Trends against Corporations The misuse of legitimate system tools a.k.a. “Living off the Land” increased again in popularity - Simple, but effective Use of malicious PowerShell scripts increased by 1000% Office files accounted for 48% of malicious email attachments, up from 5% in 2017 – Supply Chain attacks up by 78% in 2018 Living off the Land and Supply Chain Attacks Targeted Attacks Remain undetected for as long as possible, move lateral to many systems Spear-phishing remains the primary vector for targeted attacks with 65% Intelligence gathering is primary motive (96%) APT groups are going after ICS/IoT devices Less zero day vulnerabilities used

QUESTIONS ? THANK YOU ISTR : https://go.symantec.com/istr