Cybercrime tactics and techniques: Q2 2018

Thumb original malwarebytes cybercrime tactics and techniques

A generally slow quarter reflects an overall lullin cybercrime, picking up where Q1 left off with cryptominers continuing to dominate, ransomware continuing to evolve through experimentation, and exploits making a small but significant comeback.

New developments in ransomware and cryptomining drove the market, as Q2 attacks generally showed more sophistication than their Q1 counterparts. The introduction of complex VPNFilter malware, which dropped multi-stage attacks on hundreds of thousands of unsuspecting small office and consumer users, shook the sleepy cybersecurity industry awake. While 2017 outbreaks such as WannaCry and NotPetya have been as yet unmatched in terms of distribution volume and impact, VPNFilter, SamSam, and other such complicated campaigns show that 2018 may just be the year of higher-level, targeted attacks.

So how did we draw these conclusions? As we’ve done for the last several quarterly reports, we combined intel and statistics gathered from April through June 2018 from our Intelligence, Research, and Data Science teams with telemetry from both our consumer and business products, which are deployed on millions of machines. Here’s what we learned about cybercrime in the second quarter of 2018.

View whitepaper
Date: 21 November 2019, 16:45 pm   |   Provider: Malwarebytes USA   |   Size: 1.57 MB   |   Language: English
This may interest you too:
Thumb original idr infographic automation is essential for cyber resilience final july 2019

Why automation is essential for cyber resilience

Digital transformation makes today’s businesses more productive and more vulnerable to cyberattacks. Security professionals know that breaches are inevitable. To be successful, companies must establish cyber-resilient endpoints. Where do you turn when legacy approaches fail? In a word: Automation. ...

To the download
Who you gonna call   why we need a cyber emergency service  verschoben

Who you gonna call? Why we need a cyber emergency service

What options do companies have to respond to, remediate, and mitigate against breaches and being hit by compliance fines?

SMEs need protecting more than ever. The volume and viciousness of cyberattacks and data reaches means there is an increasing need for an emergency service, a method of recovery to isolate problems, fix them and get the business up and running as quickly as possible. Being able to respond and remediate incidents quickly is essential. Resilience is key... ...

To the download
Thumb original a checklist for cloud data management

A Checklist for Cloud Data Management

Upgrade your data management strategy to support today’s demands. The system – or systems – you purchased or inherited years ago are probably not appropriate for the modern data protection needs of your organization.

Use this handy checklist when you’re researching data protection that supports files, applications, databases and hypervisors, plus both public and private clouds.
...

To the download
How to realistically improve your recoverability with commvault

How to Realistically Improve Your Recoverability with Commvault

Keep Your Business Running With Faster and More Efficient Recovery

Your goal is high availability for the applications, databases, virtual machines (VMs), servers, and data that run your business. When access is lost or interrupted, recovery speed is critical, and must be measured in minutes and seconds, not hours or days. And if your backup and recovery strategy includes point solutions with limited coverage, legacy approaches that don’t support today’s modern technologies, or manual processes that are time-consuming and complex, you may no ...

To the download
Thumb original produkt1 okta gettingstartedwithzerotrust final

Getting Started with Zero Trust

Zero Trust security throws away the idea that we should have a “trusted” internal network and an “untrusted” external network. The adoption of mobile and cloud means that we can no longer have a network perimeter-centric view of security; instead, we need to securely enable access for the various users (employees, partners, contractors, etc.) regardless of their location, device or network. There is no silver bullet when it comes to achieving a Zero Trust security architecture, but identity and access management is the core technology that orga ...

To the download