Five Cyber Attacks that Made CISOs Rethink Security

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next Five Cyber Attacks that Made CISOs Rethink Security-2 Next

Regin

Regin was used to spy on governments, infrastructure operators, businesses, researchers and individuals since at least 2008. Unlike some other APTs, Regin was not designed by someone looking to make a quick buck and escape. This highly sophisticated five-stage threat, with fully encrypted payloads, modular design and the fact that it's been around since 2008, is a force to be reckoned with. The ability to extend the core with highly targeted payloads also makes it an extensible malware platform, used for the long-term collection of data and continuous monitoring of individuals. This was the first time we saw this kind of cyber "espionage" used as collateral not only against enterprises but also against nations and governments. Despite its sophistication, the infection vector for Regin, also known as the Dropper, was just another browser-based exploit, much like a phishing site.

Gartner predicts that by 2020, 30 percent of global enterprises will have been directly compromised by an independent group of cyber activists or cyber criminals. Cyber crime is now considered a profession; malware and exploit kits are created and sold with guarantees to evade security controls. Further, Gartner estimates that while businesses spent more than $71 billion on information security in 2014, nearly $400 billion was lost globally as a result of cyber crime.

Security today is based on the premise that one can detect whether something is good or bad (e.g., web, email, files). This premise is fundamentally flawed as malware continues to evade even the latest security technologies. In this slideshow, Menlo Security CTO Kowsik Guruswamy has identified five different malware attacks that have had a profound impact on the cyber security industry.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.