The Advanced Cyber Attack Landscape
|
|
|
- Daniel Dorsey
- 10 years ago
- Views:
Transcription
1 The Advanced Cyber Attack Landscape FireEye, Inc. The Advanced Cyber Attack Landscape 1
2 Contents Executive Summary 3 Introduction 4 The Data Source for this Report 5 Finding 1 5 Malware has become a multinational activity Finding 2 8 Two key regions stand out as hotspots: Asia and Eastern Europe Finding 3 8 The majority of APT callback activities are associated with APT tools that are made in China or that originated from Chinese hacker groups Finding 4 9 Attackers are increasingly sending initial callbacks to servers within the same nation in which the victim resides Finding 5 9 Technology organizations are experiencing the highest rate of APT callback activity Finding 7 11 Techniques for disguising callback communications are evolving Finding 8 11 Attack patterns vary substantially globally Finding 8A 11 highest event rate per organization Finding 8B 12 In Japan, 87 percent of callbacks originating in Japan stayed in country Finding 8C 12 Exit rates for Canada and the U.K. were the highest at 99 and 90 percent respectively Finding 8D 13 likely heading to South Korea Conclusions 13 About FireEye 14 Finding 6 10 For APT attacks, CnC servers were hosted in the United States 66 percent of the time, a strong indicator that the U.S. is still the top target country for attacks FireEye, Inc. The Advanced Cyber Attack Landscape 2
3 Executive Summary Recent reports have pinpointed China as a key driver behind cyber attacks designed to steal to just one nation. Rather, cyber attacks are a widespread global activity. During the course of 2012, FireEye monitored more than 12 million malware communications seeking instructions or callbacks across hundreds of thousands of infected enterprise hosts, capturing details of advanced attacks as well as more generic varieties. Callback activity reveals a great deal about an attacker s intentions, interests, and geographic location. Based on end-user data, FireEye found: 1. Malware has become a multinational activity. Over the past year, callbacks were sent to command and control (CnC) servers in 184 countries a 42 percent increase when compared to 130 countries in Two key regions stand out as hotspots driving advanced cyber attacks: Asia and Eastern Europe. Looking at the average callbacks per company by country the Asian nations of China, South Korea, India, Japan, and Hong Kong accounted for 24 percent. Not far behind, the Eastern European countries of Russia, Poland, Romania, Ukraine, Kazhakstan, and Latvia comprised 22 percent. (North America represented 44 percent but as we point out in Finding #6, this is due to CnC servers residing in the United States to help attackers with evasion.) 3. The majority of Advanced Persistent Threat (APT) callback activities are associated with APT tools that are made in China or that originated from Chinese hacker groups. By mapping the DNA of known APT malware families against callbacks, FireEye discovered that the majority of APT callback activities 89 percent are associated with APT tools (mostly a tool named Gh0st RAT) that are made in China or that originated from Chinese hacker groups. 4. Attackers are increasingly sending initial callbacks to servers within the same nation in which the target resides. This approach not only improves evasion for the cybercriminals but it also gives organizations a strong indicator of which countries are most interesting to attackers. 5. Technology organizations are experiencing the highest rate of APT callback activity. With a high heavy APT malware activity. 6. For APT attacks, CnC servers were hosted in the United States 66 percent of the time, a strong indicator that the U.S. is still the top target country for attacks. As previously mentioned, attackers increasingly put CnC servers in the target country to help avoid detection. With such a high proportion of CnC servers, the U.S. is subject to the highest rate of malware attacks. This is most likely due to a very high concentration of intellectual property and digitized data that resides in the U.S. 7. Techniques for disguising callback communications are evolving. To evade detection, CnC servers are leveraging social networking sites like Facebook and Twitter for communicating with infected FireEye, Inc. The Advanced Cyber Attack Landscape 3
4 8. Attack patterns vary substantially globally: a.. Due to a robust internet infrastructure, South Korea has emerged as a fertile location for cybercriminals to host their CnC infrastructure. For example, FireEye found that callbacks from b. In Japan, 87 percent of callbacks originated and stayed in country. This may indicate the high value of Japanese intellectual property. c. Exit rates for Canada and the U.K. were the highest at 99 and 90 percent respectively. High exit rates indicate attackers are unconcerned about detection. In Canada and the U.K., attackers appear to be unconcerned about detection and pursue low-hanging fruit opportunistically. This FireEye report draws on data from hundreds of thousands of hosts and millions of callback communications to provide a broader context of the global threat landscape. Introduction When seeking to root out corruption, journalists and detectives are taught to follow the money. When seeking to understand and combat today s new breed of cyber attacks, security teams are Drawing on end-user data gathered by the FireEye Malware Protection System (MPS), this report provides an in-depth look at the callback activity associated with this new breed of cyber attacks, including sophisticated malware and APTs that are evading traditional defenses and compromising organizations. This report provides new, unprecedented intelligence on the types and locations of organizations being targeted, as well as the locations of the CnC servers used in these attacks. Today s organizations are constantly being victimized and besieged by sophisticated cyber attacks including zero-day exploits and APTs and traditional IT security defenses are providing little protection. The cybercriminals and nation-states behind these attacks are utilizing targeted approaches and advanced malware over the Web and to routinely bypass traditional signature-based perimeter and endpoint security defenses, compromise enterprise networks, and This new breed of cyber attacks typically includes several distinct yet coordinated stages. They these stages, callbacks represent a critical juncture, one in which compromised machines establish communication with an external CnC server. Once this communication is established, cybercriminals can achieve a host of malicious objectives, including modifying malware to evade detection, Given the pivotal role these callbacks play within the new breed of cyber attacks being waged today, it is important for security practitioners and researchers to understand them. This callback activity provides vital insights into the nature of today s attacks, offering details about the family of malicious software employed, the countries and industries of the companies being targeted, and the location of the CnC servers orchestrating these attacks. FireEye, Inc. The Advanced Cyber Attack Landscape 4
5 The Data Source for this Report FireEye is in a unique position to illuminate the callback activity associated with today s new breed systems (IPS) and other security gateways, and represents an additional line of defense. The FireEye platform is designed to detect and thwart advanced attacks after they ve bypassed the traditional signature-based security defenses that enterprises have in place. Thousands of FireEye appliances have been deployed around the globe. These appliances automatically gather threat intelligence associated with today s new breed of cyber attacks. This data can then be anonymized, aggregated, analyzed, and shared 1 via the FireEye Dynamic Threat Intelligence cloud. This report draws on an analysis of the callback data collected during the course of Over the year, callbacks were sent to 184 countries with more than 12 million events logged across hundreds of thousands of infected machines. In conducting its research, FireEye calculated the number of events detected at each deployment, and then normalized the data based on per end-user metrics in order to make accurate comparisons of callback rates for various locations and industries. With this approach, FireEye has been able to gain vital insights into the locations of companies that are most frequently targeted. This data tells us organizations in other locations. Finding 1: Malware has become a multinational activity During 2012 callbacks were sent to CnC servers in 184 countries a 41 percent increase over the Cybercriminals and nation-states use these servers to orchestrate various types of malicious activities. Growth of Countries Hosting CnC Servers Figure 1: Total number of countries worldwide hosting CnC servers FireEye, Inc. The Advanced Cyber Attack Landscape 5
6 The distribution of countries involved is also changing. In 2011, the United States, Ukraine, and Russia were the top countries for hosting CnC servers. In 2012, the top 20 nations hosting CnC servers were: 1. U.S. 2. South Korea 3. China 4. Russia 5. Ukraine 6. Germany 7. Poland 8. Romania 9. India 10. Kazakhstan 11. Taiwan 12. U.K. 13. Canada 14. Netherlands 15. Japan 16. France 17. Turkey 18. Argentina 19. Brazil 20. Hong Kong While Ukraine and Russia were in the top three countries to host CnC servers in 2011, they dropped Looking back we see explosive growth in the complexity of the malware problem, which created new challenges for the organizations that were relying solely on traditional security approaches to protect organizations that are employing a traditional geographic location-based approach in which network With hackers increasingly hosting their servers in less suspicious countries, these traditional defenses simply will not work anymore to protect against many sophisticated attacks. These trends make it clear that IT security governance models need to evolve. Proportion of Top 20 Countries Hosting CnC Servers 2% 2% 2% 2% 2% 4% 3% 3% 4% 1% 1% 1%1% 1% 1% 2% 25% United States Other South Korea China Russia Ukraine Germany Poland U.K. Tawain Canada Netherlands Japan France Turkey Brazil 5% Romania Argentina 5% 7% 19% India Kazakhstan Hong Kong Figure 2: Top 20 countries hosting CnC servers FireEye, Inc. The Advanced Cyber Attack Landscape 6
7 Global Distribution of CnC Servers Figure 3: Heatmaps showing the distribution of CnC servers worldwide over time FireEye, Inc. The Advanced Cyber Attack Landscape 7
8 Finding 2: Two key regions stand out as hotspots: Asia and Eastern Europe Looking at the total callbacks per company across various regions, the Asian nations of China, South Korea, India, Japan, and Hong Kong accounted for 24 percent of the world s volume. Russia, Poland, Romania, Ukraine, Kazhakstan, and Latvia comprised 22 percent. North America represented 44 percent, but as pointed out in Finding #6, this is due to CnC servers residing in the United States to help attackers with evasion. Regional Callback Volumes 22% 7% 3% 44% North America APAC Eastern Europe Western Europe Latin America 24% Figure 4: Average total callbacks per company summarized by region Finding 3: The majority of APT callback activities are associated with APT tools that are made in China or that originated from Chinese hacker groups By mapping the DNA of known APT malware families to APT-related callbacks, FireEye discovered that the majority of callback activities 89 percent are associated with APT tools that are made in China or that originated from hacker groups based in China. However, only a relatively small percentage of callbacks associated with these tools are going directly to CnC servers based in China. The main tool, developed in China, is called Gh0st RAT. In addition, FireEye discovered that the majority of the most popular non-apt callback activities in Japan and South Korea are also associated with APT tools that are made in China or that originated from Chinese hacker groups. And as previously referenced, only a small percentage of these callbacks are going to CnC servers based in China. FireEye, Inc. The Advanced Cyber Attack Landscape 8
9 Finding 4: Attackers are increasingly sending initial callbacks to servers within the same nation in which the victim resides Callback data makes it clear that APT attackers have become smarter about how they carry out their campaigns. To better evade detection hackers are increasingly placing CnC servers within the same nation as their targets. Cybercriminals often set up multiple network hops between their location and the CnC infrastructure. Thus, while a compromised system will communicate with a CnC server in one location, the cybercriminal may very well be in a different location. In addition, in the past, CnC servers may have been hosted in locations far away from the target organization which would raise suspicions. This approach is increasingly uncommon. Attackers may such as Japan and South Korea, but that is based on malware developed by Chinese hacker groups. immediately exited the target nation (see Finding #8C). Finding 5: Technology organizations are experiencing the highest rate of APT callback activity While today s new breed of cyber attacks target many verticals, FireEye data reveals some industries are much more frequently attacked than others. In 2012, technology companies experienced the highest rate of callback activity associated with next-generation cyber attacks. Whether the objectives criminal initiatives, it is clear that technology companies are prominent and consistent targets. The most interesting verticals for APT activity are: Insurance FireEye, Inc. The Advanced Cyber Attack Landscape 9
10 In addition, while data from government agencies is not included in these statistics one only needs to read the headlines of industry publications to know that these organizations are also frequently being targeted. Percentage of Total Infections 6% 6% 5% 3% 25% Technology Banking/Finance/ Insurance Manufacturing Healthcare Telecommunications Business Services Retail Logistics/ Transportation 7% Entertainment/ Media Other 6% 8% 14% Energy & Utilities 8% 9% 9% Figure 5: Most targeted industries for APT attacks Finding 6: For APT attacks, CnC servers were hosted in the United States 66 percent of the time, a strong indicator that the U.S. is still the top target country for attacks The 2012 data reveals that the United States hosts the most CnC servers that receive callbacks associated with RAT tools originating in China. Given that the majority of victims of these attacks are based in the U.S., it is clear that attackers are housing CnC servers in the same country as their targets in order to help avoid raising suspicions. FireEye found that 66 percent of CnC servers were hosted in the U.S. The U.S. is a prime target due to a high volume and concentration of intellectual property and digitized data. 1%1% 1% 1% APT Hosting Countries 3% 4% United States Hong Kong Singapore India 5% South Korea Taiwan 5% Japan China Other Canada 13% 6% 66% Figure 6: Percentage of countries hosting APT-focused CnCs FireEye, Inc. The Advanced Cyber Attack Landscape 10
11 Finding 7: Techniques for disguising callback communications are evolving communications methods. 2 Two recent advances highlight the variety of methods attackers deploy: Use of social networks: Attackers use social networks to easily and anonymously receive updates on exploits. Sites such as Facebook and Twitter are commonly used. However, in China local social networking sites are used. by attackers to get updates from malware. Network Inspection Evasions: In order to appear as normal technologies, attackers now embed commands or stolen contained attacker commands. Figure 7a: screenshot of Baidu, a Chinese social network site attacker commands Finding 8: Attack patterns vary substantially globally the highest event rate per organization In 2012, companies in South Korea received the highest number of events per organization. In recent years, South Korea has emerged as a fertile location for cybercriminals to host their infrastructure and it seems these criminals are focused on targeting local organizations. intellectual property. It appears cybercriminals that are looking to exploit this intellectual property have FireEye, Inc. The Advanced Cyber Attack Landscape 11
12 Finding 8B: In Japan, 87 percent of callbacks originating in Japan stayed in country terminating in the country. The United States was third on this list, with 47 percent of the callback to the fact that cybercriminals try to disguise their whereabouts by employing communications across multiple locations. with sensitive intellectual property. This characteristic has likely drawn in attackers who host their CnC infrastructure within Japan s borders. Finding 8C: Exit rates for Canada and the U.K. were the highest at 99 and 90 percent respectively callbacks stayed in country. Interestingly, companies in other countries, such as Turkey and Saudi Arabia, likely to exit the country of the organization targeted. In some cases, attacks are less focused and stealthy, and the companies targeted are simply the low-hanging fruit for opportunistic cybercriminals regardless of where the organization is located. In other cases, the location of CnC servers is driven by FireEye, Inc. The Advanced Cyber Attack Landscape 12
13 are most likely heading to South Korea which illustrate the high-level trends concerning the location and intent of the most active cybercriminals. than the United States, the second highest destination. However, much of this activity going to CnC servers located in South Korea is associated with tools developed in China. one and South Korea a very close second. In other industries, including manufacturing, healthcare, and energy and utilities, the United States is the destination of the vast majority of callbacks. In a sense, South Korea is plagued by RATs. It is clear from the 2012 data that South Korea is one of the top callback destinations in the world and that some of the country s callback activities are associated with more targeted attacks that employ RATs. Most likely, one of the reasons is that South Korea has one of the best Internet infrastructures in Asia, making it a preferred locale for attackers looking to host their CnC servers. By far, the most popular RAT sending callbacks to South Korea is known as Gh0st. Callbacks associated with Gh0st are not exclusive to South Korea, but for some reason this RAT is commonly used by attackers who set up their CnC servers in South Korea, which seems to indicate either a larger group or many groups have made this their tool of choice. Gh0st malware originated from a Chinese hacker group and has for a long time been a popular tool for hacker groups based in China. Conclusion Depending on your organization s industry and location, the scope, frequency, and nature of attacks your organization encounters can vary substantially. By assessing callback information, you can begin to take a more realistic look at the threats your organization will likely face, and the steps needed to guard against these attacks. To learn more be sure to explore the FireEye Advanced Cyber Attack Landscape [ ]. These interactive maps enable you to collected by FireEye. FireEye, Inc. The Advanced Cyber Attack Landscape 13
14 About FireEye FireEye has pioneered the next generation of threat protection to help organizations protect themselves from being compromised. Cyber attacks have become much more sophisticated and are now easily gateways, compromising the majority of enterprise networks. The FireEye platform supplements these legacy defenses with a new model of security to protect against the new breed of cyber attacks. The unique FireEye platform provides the industry s only cross-enterprise threat protection fabric to dynamically identify and block cyber attacks in real time. The core of the FireEye platform is a signature-less, virtualized detection engine and a cloud-based threat intelligence network, which help organizations protect their FireEye platform is deployed in over 40 countries and more than 1,000 customers and partners, including over 25 percent of the Fortune FireEye, Inc. All rights reserved. FireEye is a registered trademark of FireEye, Inc. All other brands, products, or service names are or may be trademarks or service marks of their respective owners. RPT.CAL.EN-US FireEye, Inc. The Advanced Cyber Attack Landscape 14 FireEye, Inc McCarthy Blvd. Milpitas, CA FIREEYE ( ) [email protected]
Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks
White Paper Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks A Guide for CIOs, CFOs, and CISOs White Paper Contents The Problem 3 Why You Should Care 4 What You Can Do About It
White Paper. Advantage FireEye. Debunking the Myth of Sandbox Security
White Paper Advantage FireEye Debunking the Myth of Sandbox Security White Paper Contents The Myth of Sandbox Security 3 Commercial sandbox evasion 3 Lack of multi-flow analysis and exploit detection 3
Spear Phishing Attacks Why They are Successful and How to Stop Them
White Paper Spear Phishing Attacks Why They are Successful and How to Stop Them Combating the Attack of Choice for Cybercriminals White Paper Contents Executive Summary 3 Introduction: The Rise of Spear
Securing Cloud-Based Email
White Paper Securing Cloud-Based Email A Guide for Government Agencies White Paper Contents Executive Summary 3 Introduction 3 The Risks Posed to Agencies Running Email in the Cloud 4 How FireEye Secures
SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal
WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise
White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks
White Paper Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks White Paper Executive Summary Around the world, organizations are investing massive amounts of their budgets
How To Protect Your Endpoints From Attack
2012 Endpoint Security Best Practices Survey GLOBAL RESULTS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Top tier organizations fare better against attacks... 8 Finding 2: Top tier organizations
Security Business Review
Security Business Review Security Business Review Q4: 2014 2 By Bitdefender Labs Security Business Review Botnet Anonymization Raises New Security Concerns Executive Overview While botnets, which are large
Content Security: Protect Your Network with Five Must-Haves
White Paper Content Security: Protect Your Network with Five Must-Haves What You Will Learn The continually evolving threat landscape is what makes the discovery of threats more relevant than defense as
Addressing Big Data Security Challenges: The Right Tools for Smart Protection
Addressing Big Data Security Challenges: The Right Tools for Smart Protection Trend Micro, Incorporated A Trend Micro White Paper September 2012 EXECUTIVE SUMMARY Managing big data and navigating today
FIREEYE THREAT INTELLIGENCE SOUTHEAST ASIA: AN EVOLVING CYBER THREAT LANDSCAPE SECURITY REIMAGINED MARCH 2015
S P E C I A L R E P O R T FIREEYE THREAT INTELLIGENCE SOUTHEAST ASIA: AN EVOLVING CYBER THREAT LANDSCAPE MARCH 2015 SECURITY REIMAGINED CONTENTS MARCH 2015 Introduction 3 Key Findings 4 Detecting Targeted
SPEAR-PHISHING ATTACKS
SPEAR-PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM WHITE PAPER RECENTLY, THERE HAS BEEN A RAPID AND DRAMATIC SHIFT FROM BROAD SPAM ATTACKS TO TARGETED EMAIL-BASED-PHISHING CAMPAIGNS THAT
FireEye Fuel Partner Program
FireEye Fuel Partner Program Welcome FireEye has pioneered the next generation threat protection platform to help organizations protect themselves from being compromised. The FireEye platform creates
Global Network and Application Security Testing Market An Overview of Emerging Trends and Growth Opportunities For Test Solution Vendors
Global Network and Application Security Testing Market An Overview of Emerging Trends and Growth Opportunities For Test Solution Vendors May 2013 Contents Section Slide Numbers Executive Summary 4 Market
Unknown threats in Sweden. Study publication August 27, 2014
Unknown threats in Sweden Study publication August 27, 2014 Executive summary To many international organisations today, cyber attacks are no longer a matter of if but when. Recent cyber breaches at large
The Ostrich Effect In Search Of A Realistic Model For Cybersecurity
The Ostrich Effect In Search Of A Realistic Model For Cybersecurity 1 Contents Introduction 3 Threats Stealthy, Sophisticated & Successful 4 Operation Beebus 5 G20 Brisbane 2014 6 Redefining the Debate
WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.
WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY. A guide for IT security from BIOS The Problem SME s, Enterprises and government agencies are under virtually constant attack today. There
Threat Landscape. Threat Landscape. Israel 2013
Threat Landscape Threat Landscape Israel 2013 Document Control Document information Version Title Creation Date Revision Date 1.4 Threat Intelligence / Israel 2013 17 January 2014 27 January 2014 Contact
Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?
A Cloud Security Primer : WHAT ARE YOU OVERLOOKING? LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is not intended and should not be construed
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
United Kingdom Internet Security Threat Profile
Internet Security Threat Profile Worldwide Ranking.%.%.%.%.%.%.%.%.%.%.%.% Overall Average Spam Zombies Malicious Code Phishing Hosts Bots Network Copyright Symantec Corporation. All rights reserved. Symantec,
A Modern Framework for Network Security in the Federal Government
A Modern Framework for Network Security in the Federal Government 1 A MODERN FRAMEWORK FOR NETWORK SECURITY IN THE FEDERAL GOVERNMENT Trends in Federal Requirements for Network Security In recent years,
Breaking the Cyber Attack Lifecycle
Breaking the Cyber Attack Lifecycle Palo Alto Networks: Reinventing Enterprise Operations and Defense March 2015 Palo Alto Networks 4301 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com
Big Threats for Small Businesses
White Paper Big Threats for Small Businesses Five Reasons Your Small or Midsize Business is a Prime Target for Cybercriminals White Paper Contents Introduction 3 Today s Attacks Target Small and Midsize
CISO Guide to Next Generation Threats
White Paper CISO Guide to Next Generation Threats Combating Advanced Malware, Zero-Day and Targeted APT Attacks White Paper Table of Contents Introduction The Moving Target: From PII to IP to Credentials
June 2012. Palo Alto Networks 3300 Olcott Street Santa Clara, CA 94089 www.paloaltonetworks.com
The Application Usage and Risk Report An Analysis of End User Application Trends in the Enterprise Regional Findings Americas (Latin and South America, Canada, U.S.A.) Europe, Africa, Middle East Asia
Websense Messaging Security Solutions. Websense Email Security Websense Hosted Email Security Websense Hybrid Email Security
Websense Email Security Websense Hosted Email Security Websense Hybrid Email Security Websense Messaging Security Solutions The Websense Approach to Messaging Security Websense enables organizations to
Carbon Black and Palo Alto Networks
Carbon Black and Palo Alto Networks Bring Together Next-Generation Endpoint and Network Security Solutions Endpoints and Servers in the Crosshairs of According to a 2013 study, 70 percent of businesses
GLOBAL B2C E-COMMERCE DELIVERY 2015
PUBLICATION DATE: OCTOBER 2015 PAGE 2 GENERAL INFORMATION I PAGE 3 KEY FINDINGS I PAGE 4-8 TABLE OF CONTENTS I PAGE 9 REPORT-SPECIFIC SAMPLE CHARTS I PAGE 10 METHODOLOGY I PAGE 11RELATED REPORTS I PAGE
Asia-Pacific Web Application Firewall Market Increasing Attacks on the Application Layer are Driving the Market
Asia-Pacific Web Application Firewall Market Increasing Attacks on the Application Layer are Driving the Market May 2015 1 Contents Section Slide Number Executive Summary 3 Market Overview 9 Total Web
How Do Threat Actors Move Deeper Into Your Network?
SECURITY IN CONTEXT LATERAL MOVEMENT: How Do Threat Actors Move Deeper Into Your Network? LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is
FireEye Advanced Threat Report: 2013
FireEye Advanced Threat Report: 2013 FireEye Labs February 2014 FireEye, Inc. FireEye Advanced Threat Report: 2013 1 Advanced Threat Report Contents Executive Summary 2 About the Data in This Report 4
Unified Security, ATP and more
SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users
Next Generation Security Strategies. Marc Sarrias Regional Sales Manager [email protected]
Next Generation Security Strategies Marc Sarrias Regional Sales Manager [email protected] IT Ever-Evolving Challenges & Constraints Support IT Initiatives Minimize Business Risks from Cybersecurity
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
Security Intelligence Services. www.kaspersky.com
Kaspersky Security Intelligence Services. Threat Intelligence Services www.kaspersky.com THREAT INTELLIGENCE SERVICES Tracking, analyzing, interpreting and mitigating constantly evolving IT security threats
Gaining the upper hand in today s cyber security battle
IBM Global Technology Services Managed Security Services Gaining the upper hand in today s cyber security battle How threat intelligence can help you stop attackers in their tracks 2 Gaining the upper
Advanced Targeted Attacks
White Paper Advanced Targeted Attacks How to Protect Against the Next Generation of Cyber Attacks White Paper Contents Executive Summary 3 Nature of Next-Generation Threats 4 The Price of The Problem 6
The big pay turnaround: Eurozone recovering, emerging markets falter in 2015
The big pay turnaround: Eurozone recovering, emerging markets falter in 2015 Global salary rises up compared to last year But workers in key emerging markets will experience real wage cuts Increase in
Cisco Blended Agent: Bringing Call Blending Capability to Your Enterprise
DATA SHEET Cisco Blended Agent: Bringing Call Blending Capability to Your Enterprise Cisco ICM software has traditionally enabled companies to distribute inbound service volume to a variety of termination
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
Advanced Persistent Threats
Emilio Tonelli Senior Sales Engineer South Europe WatchGuard Technologies, Inc. Advanced Persistent Threats the new security challenge Are you protected? Current Threat Landscape 2 Global Threat Landscape:
GWI Commerce Summary Q2 2014
GWI Commerce Summary Q2 2014 GlobalWebIndex s quarterly report on the latest trends in e-, m- and t-commerce 1 Introduction GWI Commerce is where GlobalWebIndex presents the very latest figures for online
How To Protect Your Organization From Insider Threats
Research Conducted by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security FINANCIAL SERVICES EDITION #2015InsiderThreat RESEARCH BRIEF US FINANCIAL SERVICES SPOTLIGHT ABOUT
Reduce Your Network's Attack Surface
WHITE PAPER Reduce Your Network's Attack Surface Ixia's ThreatARMOR Frees Up Security Resources and Personnel The Threat Landscape When you re dealing with network security, one of the primary measurements
Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives
Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Energy and Commerce Subcommittee on Oversight and Investigations
EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS
EXTENDING THREAT PROTECTION AND WHITEPAPER CLOUD-BASED SECURITY SERVICES PROTECT USERS IN ANY LOCATION ACROSS ANY NETWORK It s a phenomenon and a fact: employees are always on today. They connect to the
SOLUTION BRIEF. Next Generation APT Defense for Healthcare
SOLUTION BRIEF Next Generation APT Defense for Healthcare Overview Next Generation APT Defense for Healthcare Healthcare records with patients personally identifiable information (PII) combined with their
WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform
WHITE PAPER Cloud-Based, Automated Breach Detection The Seculert Platform Table of Contents Introduction 3 Automatic Traffic Log Analysis 4 Elastic Sandbox 5 Botnet Interception 7 Speed and Precision 9
Best Practices for a BYOD World
Face Today s Threats Head-On: Best Practices for a BYOD World Chris Vernon CISSP, VTSP Security Specialist Agenda Mobile Threats Overview 2013 State of Mobility Survey Canada BYOD Best Practices 2 Mobile
A Nielsen Report Global Trust in Advertising and Brand Messages. April 2012
A Nielsen Report Global Trust in Advertising and Brand Messages April 2012 CONSUMER TRUST IN EARNED ADVERTISING GROWS IN IMPORTANCE Earned media sources remain most credible Trust in traditional paid advertising
DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?
A Special Primer on APTs DETECTING THE ENEMY INSIDE THE NETWORK How Tough Is It to Deal with APTs? What are APTs or targeted attacks? Human weaknesses include the susceptibility of employees to social
When attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher
TrendLabs When attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher Advanced persistent threats (APTs) refer to a category
Symantec Advanced Threat Protection: Network
Symantec Advanced Threat Protection: Network DR150218C April 2015 Miercom www.miercom.com Contents 1.0 Executive Summary... 3 2.0 Overview... 4 2.1 Products Tested... 4 2.2. Malware Samples... 5 3.0 How
2015 GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY
2015 GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY 1 EXECUTIVE SUMMARY INTRODUCING THE 2015 GLOBAL THREAT INTELLIGENCE REPORT Over the last several years, there has been significant security industry
5 Design Principles for Advanced Malware Protection
White Paper 5 Design Principles for Advanced Malware Protection Winning the war against next-generation threats White Paper Table of Contents Executive Summary 1 Advanced Malware Defined 1 Understanding
Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape
White Paper Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape Financial services organizations have a unique relationship with technology: electronic data and transactions
Five Steps For Securing The Data Center: Why Traditional Security May Not Work
White Paper Five Steps For Securing The Data Center: Why Traditional Security May Not Work What You Will Learn Data center administrators face a significant challenge: They need to secure the data center
The Fortinet Advanced Threat Protection Framework
WHITE PAPER The Fortinet Advanced Threat Protection Framework A Cohesive Approach to Addressing Advanced Targeted Attacks The Fortinet Advanced Threat Protection Framework Table of Contents Introduction
The Fundamental Failures of End-Point Security. Stefan Frei Research Analyst Director [email protected]
The Fundamental Failures of End-Point Security Stefan Frei Research Analyst Director [email protected] Agenda The Changing Threat Environment Malware Tools & Services Why Cybercriminals Need No 0-Days
Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model
White Paper Addressing the Full Attack Continuum: Before, During, and After an Attack It s Time for a New Security Model Today s threat landscape is nothing like that of just 10 years ago. Simple attacks
GLOBAL DATA CENTER SPACE 2013
2013 CENSUS REPORT: Global Data Center Space 2013 GLOBAL DATA CENTER SPACE 2013 Top 3 data center markets account for almost half of all global data center space. In spite of a slowdown in the amount of
2012 NORTON CYBERCRIME REPORT
2012 NORTON CYBERCRIME REPORT 2012 NORTON CYBERCRIME REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND,
Mitigating Web Threats with Comprehensive, Cloud-Delivered Web Security
White Paper Mitigating Web Threats with Comprehensive, Cloud-Delivered Web Security Overview For collaboration, communication, and data access, the web has become a mission-critical business tool. But
Non-Geeks Guide to. Network Threat Prevention
Non-Geeks Guide to Network Threat Prevention 1 2 Table of Contents The Evolution of Network Security Network Security: A Constantly-Evolving Threat Why are networks at more risk than ever before? Evaluating
Sybase Solutions for Healthcare Adapting to an Evolving Business and Regulatory Environment
Sybase Solutions for Healthcare Adapting to an Evolving Business and Regulatory Environment OVERVIEW Sybase Solutions for Healthcare Adapting to an Evolving Business and Regulatory Environment Rising medical
Analyzing HTTP/HTTPS Traffic Logs
Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that
SECURITY REIMAGINED. FireEye Network Threat Prevention Platform. Threat Prevention Platform that Combats Web-based Cyber Attacks
SECURITY REIMAGINED FireEye Network Threat Prevention Platform Threat Prevention Platform that Combats Web-based Cyber Attacks D A T A S H E E T SECURITY REIMAGINED HIGHLIGHTS Deploys in-line (block/monitor
Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security
Web Security Gateway Web Security Web Filter Express Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content
Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper
with Cloud-Based Security Services > White Paper It s a phenomenon and a fact: employees are always on today. They connect to the network whenever they want, from wherever they happen to be, with laptops,
Design Your Security
Design Your Security We build tailored, converged security for you. converged Technology. Strategy. People. The synergetic collaboration. agile Hackers sleep - we don t. We re ready whenever, wherever.
Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth
Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference
Why a Network-based Security Solution is Better than Using Point Solutions Architectures
Why a Network-based Security Solution is Better than Using Point Solutions Architectures In This Paper Many threats today rely on newly discovered vulnerabilities or exploits CPE-based solutions alone
Cyber Situational Awareness for Enterprise Security
Cyber Situational Awareness for Enterprise Security Tzvi Kasten AVP, Business Development Biju Varghese Director, Engineering Sudhir Garg Technical Architect The security world is changing as the nature
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
CLARINS China commerce site adds to brand s momentum in China
An RIS News Case Study CLARINS China commerce site adds to brand s momentum in China Business Best known for luxury skin care products, CLARINS sells cosmetics in every country around the world through
Advanced Cyber Threats in State and Local Government
RESEARCH SURVEY Advanced Cyber Threats in State and Local Government January 2014 SHUTTERSTOCK UNDERWRITTEN BY: Section 1: Executive Overview In the past, scattershot, broad-based attacks were often more
you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services
MSSP you us are a Managed Security Service Provider looking to offer Advanced Malware Protection Services Lastline is the only company with 10+ years of academic research focused on detecting advanced
WHITE PAPER ADVANCED TARGETED ATTACKS: How to Protect Against the New Generation of Cyber Attacks SECURITY REIMAGINED
WHITE PAPER ADVANCED TARGETED ATTACKS: How to Protect Against the New Generation of Cyber Attacks SECURITY REIMAGINED CONTENTS Executive Summary...3 Nature of the New Generation of Threats...4 The Five
STATE OF GLOBAL E-COMMERCE REPORT (Preview) February 2013
STATE OF GLOBAL E-COMMERCE REPORT (Preview) February 2013 THE E-COMMERCE REPORT WHAT IS THE E-COMMERCE REPORT? It is an annual investigation into the global uptake and impact of e- commerce. The report
