ORGANISATIONS NEED TO ADOPT A MULTI-LAYERED CYBERSECURITY STRATEGY THAT PREVENTS THESE ATTACKS FROM TAKING HOLD OF THEIR NETWORKS AND DATA .
TRENDING
cloud infrastructures to exploit its computational power and multiply profits for threat actors
• Multi-platform attacks on the rise – Up until the end of 2017 , multi-platform malware was rare . However , the rise in the number of consumer connected devices and the growing market share of non-Windows operating systems has led to an increase in cross-platform malware . Campaign operators implement various techniques in order to take control over the campaigns ’ different infected platforms
• Mobile malware spread via the supply chain – In the first half of this year , there have been several incidences where mobile malware that has not been downloaded from a malicious URL but instead arrived already installed within the device . In addition , there was an increase in applications readily available on app stores that were actually malware under disguise , including banking trojans , adware and sophisticated remote access trojans ( RATs )
Check Point ’ s ThreatCloud intelligence is the largest collaborative network to fight cybercrime and it delivers threat data and attack trends from a global network of threat sensors .
The ThreatCloud database holds over 250 million addresses analysed for bot discovery , more than 11 million malware signatures and over 5.5 million infected websites and identifies millions of malware types daily . •
“
ORGANISATIONS NEED TO ADOPT A MULTI-LAYERED CYBERSECURITY STRATEGY THAT PREVENTS THESE ATTACKS FROM TAKING HOLD OF THEIR NETWORKS AND DATA .
30 INTELLIGENTCIO www . intelligentcio . com
TRENDING
cloud infrastructures to exploit its
computational power and multiply profits
for threat actors
• Multi-platform attacks on the rise –
Up until the end of 2017, multi-platform
malware was rare. However, the rise in
the number of consumer connected
devices and the growing market share of
non-Windows operating systems has led
to an increase in cross-platform malware.
Campaign operators implement various
techniques in order to take control over the
campaigns’ differen Ё�����ѕ�����љ�ɵ�+��$�5���������݅ɔ���ɕ���٥��ѡ�)�����䁍������L�%��ѡ������Ё��������ѡ��)啅Ȱ�ѡ�ɔ���ٔ������͕ٕɅ������������)ݡ�ɔ�����������݅ɔ�ѡ�Ё��́��Ё����)��ݹ��������ɽ������������́UI0����(��)%9Q11%9Q
%<)���ѕ�����ɥٕ����ɕ��䁥��х�����ݥѡ��)ѡ����٥����%������ѥ����ѡ�ɔ�݅́��)���ɕ�͔�����������ѥ��́ɕ����䁅م������)��������ѽɕ́ѡ�Ёݕɔ����Յ��䁵��݅ɔ)չ��ȁ��͝ե͔������Ց�������������ɽ���̰)��݅ɔ�����ͽ����ѥ��ѕ��ɕ��є�������)�ɽ���̀�IQ̤)
�����A���ӊéQ�ɕ��
��Ր���ѕ�����������)ѡ����ɝ��Ё�������Ʌѥٔ����ݽɬ�Ѽ������)�剕ɍɥ��������Ё����ٕ�́ѡɕ�Ё��ф����)��х����ɕ��́�ɽ��������������ݽɬ���)ѡɕ�Ё͕�ͽ�̸)Q���Q�ɕ��
��Ր���х��͔�����́�ٕ�(���������������ɕ�͕́�����͕����ȁ���)��͍�ٕ�䰁��ɔ�ѡ����ā�����������݅ɔ)ͥ�����ɕ́�����ٕȀԸԁ�������������ѕ�)ݕ�ͥѕ́��������ѥ���́�������́������݅ɔ)����́����丁�+�p)=I9%MQ%=9L)9�Q<�=AP�)5U1Q$�1eI)
e IM
UI%Qd)MQIQd�Q!P)AIY9QL�Q!M)QQ
-L�I=4)Q-%9�!=1�=)Q!%H�9Q]=I-L)9�Q�)��ܹ��ѕ������э������