With malware increasingly adopting the “as-a-service” business model, Advanced Persistent Threat (APT) groups that have traditionally been state sponsored, may see tremendous value in using the business model as well.
Organizations of all sizes and verticals should consider evaluating and updating their threat models to include APTs, or risk falling victim to data breaches and industrial espionage.
All about Virtualization and Cloud Security | Recent Articles:
- More attacks aimed at exploiting unpatched year-old vulnerabilities
- An increase in stealth/covert execution tactics
- APT-hackers-for-hire becoming the new norm
- Bitdefender identified a new attack attributed to a sophisticated actor offering advanced-persistent-threats-as-a-service
- The targeted company is engaged in architectural projects with billion-dollar luxury real-estate developers in New York, London, Australia and Oman
- The Bitdefender technology stacks detect the used payloads as well as the malicious behavior
Security has been a huge concern for both businesses and individuals as many employees continue to work from home, with many woefully under prepared for the impact that COVID-19 has had. In fact, new research by Bitdefender found half of infosec professionals (50%) didn’t have a contingency plan in place for COVID-19 or a similar scenario. These findings, and more, are revealed today in the first instalment of Bitdefender’s yet to be released global 10 in 10 Study. The section — The Indelible Impact of COVID-19 on Cybersecurity — details the pressures faced by infosec professionals during COVID-19.
Organizations and companies of all sizes have started adopting work-from-home practices to ensure business continuity and limit employee exposure to a potential viral infection.
Precisely 13 years ago, on January 28, the Council of Europe initiated European Data Protection Day to raise awareness of best practices for data protection and to help boost knowledge about personal data among organizations and individuals.
Recent investigations by Bitdefender security researchers revealed an attack tactic that could be considered fileless, from an endpoint perspective. Abusing the RDP protocol, in the sense that attackers already have legitimate RDP (Remote Desktop Protocol) credentials, means they can set up a share on their machine that acts as a resource on the local virtual network.
Imagine a world in which you could simply click onto a website to buy drugs, weapons, fake IDs, malicious software and ‘how to’ guides for building AK47s. In just a button press, you could own just about any illegal item you can think of. In the realm of the dark markets, this world, or underworld, is very much a reality.
The increase in cloud adoption has significantly impacted the way organizations think about security, in the sense that threat visibility into infrastructures has become mandatory in light of how the threat landscape has evolved. Starting from the premise that threat actors can and will breach infrastructures, organizations need to begin focusing on detecting and responding to these breaches as swiftly as possible to restore affected environments, ensure business continuity, and stay compliant with new regulations.
Data breaches have become the new norm, presenting a major security concern for organizations, as both customer personal data and a company’s intellectual property have become high value targets for cybercriminals.
While we’ve just passed the halfway mark of 2018, data breaches and new threats have been plaguing businesses and organizations, exposing the data of millions of users worldwide. Apart from known and increasingly sophisticated threats, such as ransomware, the hype around cryptocurrency has led to the emergence of cryptojackers, a new problem organizations need to deal with.
What are your plans for 5-7 June 2018 ? If you are a security professional attending Infosecurity Europe in London, we'd be delighted to meet with you, answer your questions and offer our insights into the latest cyber security trends.