Cybersecurity Threats

Contents


World News

Discussions & News

Upcoming Events

    Research & Scholarly Papers

    More Special Sections

    Cybersecurity Threats

    forward
    GameOver Zeus Botnet Disrupted
    FBI
    June 2, 2014
    On June 2, 2014, the Department of Justice and the FBI announced a multinational effort to disrupt the GameOver Zeus botnet, believed to be responsible for the theft of millions of dollars from businesses and consumers in the U.S. and around the world.

    Also announced was the unsealing of criminal charges in Pittsburgh and Omaha against alleged botnet administrator Evgeniy Mikhailovich Bogachev of Anapa, Russian Federation.

    Tags:
    forward
    Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization
    Mimecast
    2015

    Spear-phishing attacks were responsible for major data breaches and financial losses at Target, Home Depot and JPMorgan Chase in 2014.

    Get an inside look into these insidious attacks - how hackers dupe users into clicking seemingly friendly links, unleashing malware that could cost your company millions. In the US, the average cost of a breach is $12.6 million but it’s not uncommon for costs to be in the hundreds of millions.

    This whitepaper also highlights:

    • 91% of hacking begins with an email based attack, increasingly from a seemingly trusted source
    • How the average attack goes undetected for 229 days, playing out slowly over weeks and months
    • 67% of victims are notified by someone outside the company. You won’t know until it’s too late.

    Once you understand the timeline of an attack, you’ll be better prepared to protect unsuspecting employees and your network.


    Tags: Cybersecurity,
    forward
    Cisco 2015 Annual Security Report
    Cisco
    2015

    Executive Summary
    As dynamic as the modern threat landscape is, there are some constants.

    Adversaries are committed to continually rening or developing new techniques that can evade detection and hide malicious activity. Meanwhile, the defenders—namely, security teams—must constantly improve their approach to protecting the organization and users from these increasingly sophisticated campaigns. Caught in the middle are the users. But now, it appears they not only are the targets, but also the complicit enablers of attacks. The Cisco 2015 Annual Security Report, which presents the research, insights, and perspectives provided by Cisco® Security Research and other security experts within Cisco, explores the ongoing race between attackers and defenders, and how users are becoming everweaker links in the security chain. Cybersecurity is a broad and complex topic that has a farreaching impact on users, companies, governments, and other entities around the world. The Cisco 2015 Annual Security Report is divided into four areas of discussion. These sections, and the issues explored within them, may at rst glance seem disparate, but closer examination reveals their interconnectedness:

    • Threat Intelligence
    • Cisco Security Capabilities Benchmark Study
    • Geopolitical and Industry Trends
    • Changing the View Toward Cybersecurity—From Users to the Corporate Boardroom

    Tags: Cybersecurity,
    forward
    2015 Data Breach Investigations Report
    VERIZON
    2015

    The 2015 Data Breach Investigations Report (DBIR) continues the tradition of change with additions that we hope will help paint the clearest picture yet of the threats, vulnerabilities, and actions that lead to security incidents, as well as how they impact organizations suffering them. In the new “Before and Beyond the Breach” section, our security data scientists analyzed (literally) dozens of terabytes of data from partners new and old, making this one of the most collaborative, data-driven information security (InfoSec) reports in existence. If you’re accustomed to reading the DBIR mainly for the headliners and one-liners, you might need to coffee up and put your thinking cap on for this one. But it’ll be worth it; we promise. Fret not, “incident pattern” aficionados—the nefarious nine are back, but they have slimmed down a bit, as you’ll see when you get to that section.


    Tags: Cybersecurity,
    forward
    2014 Data Breach Investigations Report
    VERIZON
    2014

    Gain fresh insight into cyber espionage and denial-of-service attacks in the 2014 Data Breach Investigations Report (DBIR).

    For DBIR veterans, a cursory look at the table of contents will reveal some significant changes to the report structure you’ve gotten used to in years past. Rather than our signature approach organized around actors, actions, assets, timelines, etc., we’ve created sections around common incident patterns derived directly from the data itself (more on that later). Within each of those patterns, we cover the actors who cause them, the actions they use, assets they target, timelines in which all this took place, and give specific recommendations to thwart them. The drive for change is three-fold: first, we realized that the vast majority of incidents could be placed into one of nine patterns; second, we can (and did) draw a correlation between these incident patterns and industries; and third, we wanted to challenge ourselves to look at the data with a fresh perspective. The ultimate goal is to provide actionable information presented in a way that enables you to hash out the findings and recommendations most relevant to your organization.


    Tags: Cybersecurity,
    forward
    CYBERCRIME 2015. An Inside Look at the Changing Threat Landscape
    EMC Corporation.
    2015

    The cybercrime landscape continues to evolve as criminals look to adopt more efficient and profitable attack tactics. At the same time, the market for cybercrime-asa- service is advancing rapidly, with competition among malware vendors leading to increased innovation. And as smartphone penetration reaches record levels globally, cybercriminals are starting to switch their focus to standalone attacks on mobile devices.

    RSA Research remains at the forefront of threat detection and cybercrime intelligence, protecting global organizations with the shutdown of over a million cybercrime attacks. In 2014 the RSA Anti- Fraud Command Center identified nearly 500,000 cyberattacks — an 11% increase year over year.

    Based on its insight into cybercriminal activity, recovery of over a million actionable findings in 2014 and analysis of around 400,000 unique malware variants each week, RSA Research has identified the top cybercrime trends it expects to see evolving over the coming year.


    Tags: Cybersecurity,
    Back to Contents
    Parlament, London

    Parlament,
    London, United Kingdom

    ADN Editor in Chief
    Dr Toomas P Plaks

    London
    Contact the Editor in Chief

    LinkedIn connection requests welcome

    E-mail Directory

    • General Inquiries:
      inf@ersaconf.org
    • Paper Submission:
      sub@ersaconf.org
      No inquiries
    • CFP are sent:
      mail@ersaconf.org
      Don't reply

    WEB Directory

    • ERSA-ADN HOMEPAGE:
      http://ersaconf.org
    • ADN Journal:
      http://ersaconf.org/ersa-adn
    • ADN Issues:
      http://ersaconf.org/ersa-adn/issues.php
    • ERSA News:
      http://ersaconf.org/ersa-news
    • ERSA Conferences:
      http://ersaconf.org/ersa##
      where ## is 07, 08, 09, 10, 11, 12, 13
    • ERSA Archive:
      http://ersaconf.org/arhcive