threat landscape report...threat landscape report for q2 2018 it’s key to use threat intelligence...

1
1. LEVERAGE MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE 2. INTEGRATE ACROSS THE ENTIRE SECURITY ARCHITECTURE 3. AUTOMATE RESPONSE FOR FAST REMEDIATION “DRUPALGEDDON 2” DETECTIONS SHOWED A THOUSAND-FOLD INCREASE OVER 24 HOURS ESPECIALLY POPULAR CRYPTOJACKING TARGETS ARE MEDIA DEVICES DUE TO POWERFUL GPUS IOT DEVICES SERVE AS A BASE FOR CRYPTOJACKING 96 % SAW SEVERE EXPLOITS THREAT LANDSCAPE REPORT DOWNLOAD REPORT CAN YOU PATCH ‘EM ALL? AGILE DEVELOPMENT IS ON THE LOOSE DRUPAL EXPLOIT LED TO CRYPTOJACKING THREE THINGS YOUR ADVANCED THREAT PROTECTION MUST DO Q2 2018 AGILE DEVELOPMENT USED IN CONJUNCTION WITH POLYMORPHISM A NEW RANSOMWARE SECURITY TOOL WAS NEGATED WITHIN 48 HOURS OF RELEASE THIS MALWARE IS MORE DIFFICULT TO DETECT KNOWN VULNERABILITIES (CVE S) 103,786 ONLY 5.7% OF KNOWN VULNERABILITIES WERE TARGETED Read the Complete Threat Landscape Report for Q2 2018 IT’S KEY TO USE THREAT INTELLIGENCE TO PRIORITIZE PATCHING

Upload: others

Post on 01-Aug-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: THREAT LANDSCAPE REPORT...Threat Landscape Report for Q2 2018 IT’S KEY TO USE THREAT INTELLIGENCE TO PRIORITIZE PATCHING Title Threat Landscape Report Q2 2018 Infographic Created

1. LEVERAGE MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE

2. INTEGRATE ACROSS THE ENTIRE SECURITY ARCHITECTURE

3. AUTOMATE RESPONSE FOR FAST REMEDIATION

“DRUPALGEDDON 2” DETECTIONS SHOWED A THOUSAND-FOLD

INCREASE OVER 24 HOURS

ESPECIALLY POPULAR CRYPTOJACKING TARGETS ARE

MEDIA DEVICES DUE TO POWERFUL GPUS

IOT DEVICES SERVE AS A BASE

FOR CRYPTOJACKING

96% SAW SEVERE EXPLOITS

THREAT LANDSCAPE

REPORT

DOWNLOAD REPORT

CAN YOU PATCH ‘EM ALL?

AGILE DEVELOPMENT IS ON THE LOOSE

DRUPAL EXPLOIT LED TO CRYPTOJACKING

THREE THINGS YOUR ADVANCED THREAT PROTECTION MUST DO

Q2 2018

AGILE DEVELOPMENT USED IN CONJUNCTION WITH POLYMORPHISM

A NEW RANSOMWARE SECURITY TOOL WAS NEGATED WITHIN 48 HOURS OF RELEASE

THIS MALWARE IS MORE DIFFICULT

TO DETECT

KNOWN VULNERABILITIES (CVEs)

103,786

ONLY 5.7% OF KNOWN VULNERABILITIES

WERE TARGETED

Read the Complete Threat Landscape Report for Q2 2018

IT’S KEY TO USE THREAT INTELLIGENCE TO PRIORITIZE PATCHING