Cybercrime tactics and techniques: Q2 2018

Thumb original malwarebytes cybercrime tactics and techniques

A generally slow quarter reflects an overall lullin cybercrime, picking up where Q1 left off with cryptominers continuing to dominate, ransomware continuing to evolve through experimentation, and exploits making a small but significant comeback.

New developments in ransomware and cryptomining drove the market, as Q2 attacks generally showed more sophistication than their Q1 counterparts. The introduction of complex VPNFilter malware, which dropped multi-stage attacks on hundreds of thousands of unsuspecting small office and consumer users, shook the sleepy cybersecurity industry awake. While 2017 outbreaks such as WannaCry and NotPetya have been as yet unmatched in terms of distribution volume and impact, VPNFilter, SamSam, and other such complicated campaigns show that 2018 may just be the year of higher-level, targeted attacks.

So how did we draw these conclusions? As we’ve done for the last several quarterly reports, we combined intel and statistics gathered from April through June 2018 from our Intelligence, Research, and Data Science teams with telemetry from both our consumer and business products, which are deployed on millions of machines. Here’s what we learned about cybercrime in the second quarter of 2018.

View whitepaper
Date: 21 November 2019, 16:45 pm   |   Provider: Malwarebytes USA   |   Size: 1.57 MB   |   Language: English
This may interest you too:
Thumb original idr infographic automation is essential for cyber resilience final july 2019

Why automation is essential for cyber resilience

Digital transformation makes today’s businesses more productive and more vulnerable to cyberattacks. Security professionals know that breaches are inevitable. To be successful, companies must establish cyber-resilient endpoints. Where do you turn when legacy approaches fail? In a word: Automation. ...

To the download
Who you gonna call   why we need a cyber emergency service  verschoben

Who you gonna call? Why we need a cyber emergency service

What options do companies have to respond to, remediate, and mitigate against breaches and being hit by compliance fines?

SMEs need protecting more than ever. The volume and viciousness of cyberattacks and data reaches means there is an increasing need for an emergency service, a method of recovery to isolate problems, fix them and get the business up and running as quickly as possible. Being able to respond and remediate incidents quickly is essential. Resilience is key... ...

To the download
Thumb original rethinking your infrastructure for enterprise ai updated 25 jul 2020 85015685usen

Rethinking Your Infrastructure for Enterprise AI

IDC strongly believes that the days of homogeneous compute, in which a single architecture dominates all compute in the datacenter, are over. This truth has become increasingly evident as more and more businesses have started to launch artificial intelligence (AI) initiatives. Many of them are in an experimental stage with AI and a few have reached production readiness, but all of them are cycling unusually fast through infrastructure options to run their newly developed AI applications and services on.

The main reason for this constant ove ...

To the download
Thumb original 26017626usen 02 26017626usen

Shifting toward Enterprise-grade AI

Clients can realize the full potential of artificial intelligence (AI) and analytics with IBM’s deep industry expertise, technology solutions and capabilities and start to infuse intelligence into virtually every business decision and process.

IBM’s AI & Analytics Services organization is helping enterprises get their data ready for AI and ultimately achieve stronger data-driven decisions; access deeper insights to provide improved customer care; and develop trust and confidence with AI-powered technologies focused on security, risk and ...

To the download
Thumb original 26026326eses 01 lr 26026326eses

Lista de comprobación de limpieza de datos

Le damos la bienvenida a la era de la inteligencia artificial (IA), donde los negocios se ven supeditados a tecnologías de uso intensivo de datos, como el aprendizaje automático y el aprendizaje profundo. Para aprovechar las ventajas de estas nuevas herramientas de IA, debe asegurarse de que el “hogar” en el que almacena los datos de su organización está ordenado.

A continuación dispone de una lista de comprobación para comenzar a limpiar los datos almacenados, que se desglosa en dos fases clave del proceso de limpieza: formación e inferenc ...

To the download