SHARE
Facebook X Pinterest WhatsApp

The Rapidly Changing Security Threat Landscape

Everyone intuitively knows that applications have become the primary target of cyber criminals around the globe, but it’s another thing to see confirmation of it. Cisco this week released the latest edition of its Global Security Threat report. Beyond identifying Kazakhstan as a major source of malware on the Web, the report clearly shows that […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Jul 28, 2010

Everyone intuitively knows that applications have become the primary target of cyber criminals around the globe, but it’s another thing to see confirmation of it.

Cisco this week released the latest edition of its Global Security Threat report. Beyond identifying Kazakhstan as a major source of malware on the Web, the report clearly shows that a growing amount of malware is aimed as applications. In particular, Adobe Reader and Flash software are favored targets, while at the same time we’re seeing a surprising resurgence in SQL injection attacks.

According to Mary Landesman, a senior security researcher for Cisco, while there is an increasing number of sophisticated attacks being developed, cyber criminals prefer the path of least resistance, which in many cases means relatively rudimentary approaches to breaching application software.

The problem, says Landesman, is that with so much focus on network security at the perimeter, not enough attention is paid to securing application software. This issue stems from the fact that developers continue to think of security as an afterthought, while many internal IT organizations have yet to rethink their security posture in light of these threats.

As a result, Landesman says many IT organizations need to assess the value of various types of data within their organization in order to prioritize their security efforts. That’s especially important in the age of the borderless Web, she said, because every application out there in some form or another interacts with an externally focused application that is a primary target for hackers around the globe.

Unfortunately, as Windows and network infrastructure have become more secure, too many IT organizations have grown complacent about security at a time when cyber criminals are shifting their strategies to exploit long-standing application weaknesses.

The Rapidly Changing Security Threat Landscape - slide 1

Click through for results from a survey conducted by Cisco on the evolving security landscape.

The Rapidly Changing Security Threat Landscape - slide 2

Malware hosts are holding steady.

The Rapidly Changing Security Threat Landscape - slide 3

As are the number of URLs.

The Rapidly Changing Security Threat Landscape - slide 4

But the number of incidents is increasing.

The Rapidly Changing Security Threat Landscape - slide 5

The threats are shifting to target applications.

The Rapidly Changing Security Threat Landscape - slide 6

Surprisingly, SQL Injection attacks are on the rise again.

The Rapidly Changing Security Threat Landscape - slide 7

The rate of these attacks is increasing.

The Rapidly Changing Security Threat Landscape - slide 8

BitTorrent is no longer the worst offender.

The Rapidly Changing Security Threat Landscape - slide 9

Kazakhstan is now at the top of the list.

Recommended for you...

How DeFi is Reshaping the Future of Finance
Kihara Kimachia
Aug 25, 2022
Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.