Make no mistake, we are in a global cyber arms race. But it can’t be won alone: we are in this together. That is why SonicWall is passing along findings, intelligence, analysis and research from our SonicWall Capture Labs to you today in our 2018 SonicWall Cyber Threat Report. By sharing actionable intelligence, we can help level the playing field against today’s most malicious cyber criminals.
In February, we released our SonicWall Security 2016 Threat Report, and one of its highlights was a discussion on latest techniques and trends in exploit kits (EKs). EKs have become a key tool for cybercriminals to take over the target machines (via an exploit) and subsequently install a malware of their choice.
Today, we released the 2016 Security Annual Threat Report leveraging work by the SonicWall Threat Research Team. The annual report always raises questions from our customers and partners trying to understand what this means to them as they continually evolve their security posture. When it comes to a discussion around the big breaches, I always hear statements like “I am not big enough to target” or “I am in a different industry” or “my environment is not as complex.” However, targeting does not necessarily mean a single company.
Two days ago, Google published a blog revealing the latest critical vulnerability (CVE-2015-7547) that affects all versions of a standard GNU C Library (glibc), a big component of Enterprise Linux, which is used widely in operating systems, firmware, software and applications. The IT community is now racing to assess the risk, and gauge the impact to IT infrastructure.
When SonicWall published its 2015 Annual Threat Report, a standout statistic was the jump in attacks on SCADA (supervisory control and data acquisition) facilities. Telemetry data showed attacks increasing from 91,000+ in January 2012 to 675,000+ attacks in January 2014. I’ve been asked whether these are always attacks on the control systems themselves.
GROW BY LEVERAGING THE WEB is today’s small and medium business rally call. But, it is the echo to the call that you need to pay attention to: as you open the internet door wider, you are also opening the door for more cyber-attacks. Protection does not have to break the bank or leave you up at night.