INFOGRAPHIC
“
ALMOST NO
FIRM IS IMMUNE TO THE
EVOLVING ATTACK TRENDS
OF CYBERCRIMINALS.
exploited, organisations should consider taking a much more proactive
and strategic approach to vulnerability remediation.
Education and government application usage
When comparing application count usage across industries,
government use of SaaS applications is 108% higher than the
mean and is second to education in the total number of applications
used daily, 22.5% and 69% higher than the mean, respectively.
The likely cause for the higher usage in these two industry
segments is a greater need for a wider diversity of applications.
These organisations will require a security approach that breaks
down silos between each of these apps, including their multi-cloud
environments, for transparent visibility and security controls.
the Bankbot family introduced several innovations. It is capable of
performing ransomware, keylogger, RAT functions, SMS interception,
lock screen and call forwarding. Keeping tabs of morphing attacks
with actionable threat intelligence is vital as creativity expands.
Malware developers leverage agile development
Malware authors have long relied on polymorphism to evade
detection. Recent attack trends show they are turning to agile
development practices to make their malware even more difficult
to detect and to counter the latest tactics of anti-malware products.
GandCrab had many new releases this year, and its developers
continue to update this malware at a rapid pace.
While automation of malware attacks presents new challenges, so
does agile development because of the skills and processes to roll
out new evading releases of attack methods. To keep pace with the
agile development cybercriminals are employing, organisations need
advanced threat protection and detection capabilities that help
them pinpoint these recycled vulnerabilities.
Combating evolving attacks requires integrated security
powered by threat intelligence
The threat data in this quarter’s report once again reinforces many
of the prediction trends unveiled by the FortiGuard Labs global
research team for 2018. A security fabric that is integrated across
the attack surface and between each security element is vital. This
approach enables actionable threat intelligence to be shared at
speed and scale, shrinks the necessary windows of detection and
provides the automated remediation required for the multi-vector
exploits of today. n
Phil Quade, Chief
Information Security
Officer, Fortinet
Effective targeting of vulnerabilities
Adversaries are selective in determining what vulnerabilities they
target. With exploits examined from the lens of prevalence and volume
of related exploit detections, only 5.7% of known vulnerabilities were
exploited in the wild. If the vast majority of vulnerabilities won’t be
www.intelligentcio.com
INTELLIGENTCIO
25