The new threat landscape has changed. Cybercriminals are aggressively pursuing valuable data assets, such as financial transaction information, product design blueprints, user credentials to sensitive systems, and other intellectual property. Simply put, the cyber offense has outpaced the defensive technologies used by most companies today. Find out more on how to protect against the next generation of cyber-attacks.
Aided by their targets’ porous defenses and unwitting end users, today’s cybercriminals are able to deliver advanced malware that exploits systems and enables a range of malicious activities. Much of this advanced malware is being delivered via emails with malicious file attachments. This report provides a look at the nature of the files cybercriminals are distributing and it describes the common words used in file names and file types that characterise this advanced malware, providing key insights for users and security teams looking to guard against advanced threats. This is a must read!
Enterprises and government agencies are under virtually constant attack today. It is clear that the cybercriminals, nation-states, and hacker activists waging these attacks are growing increasingly sophisticated and more effective in their efforts to steal and sabotage. Why are today’s security defenses failing? In this battle, your security teams are using outdated arsenal - download now to learn more.
If there’s any chance of preventing these motivated adversaries from attacking our systems, stealing our data, and harming our critical infrastructure, we’ve got to think differently. Find out more on how to win the war against the new breed of cyber attacks.
The FireEye Advanced Threat Report for the second half of 2011 is based on research and trend analysis conducted by the FireEye Malware Intelligence Labs. This report provides an overview of advanced targeted attacks in the second half of 2011 and was developed to provide insights into the current threat landscape, evolving advanced persistent threat (APT) tactics, and the level of infiltration seen in organisational networks today. This is not a typical threat report with just tallies of the millions
of well-known malware or billions of spam messages. Read more.
Defending against next generation threats requires a strategy that moves beyond signatures and behavioural heuristics. Over 95% of businesses unknowingly host compromised endpoints, despite their use of traditional next-generation firewalls, intrusion prevention systems (IPS), antivirus and Web gateways. Read more.
Over 95% of businesses unknowingly host compromised endpoints, despite their use of firewalls, intrusion prevention systems (IPS), antivirus and Web gateways.1 Today’s attacks look new and unknown to signature-based tools because the attacks employ advanced malware and zero-day vulnerabilities. To regain the upper hand against next-generation attacks, enterprises must turn to true next-generation protection: signature-less, proactive and real time. Read on.
This handbook shines a light on the dark corners of advanced malware, both to educate as well as to spark renewed efforts against these stealthy and persistent threats. By understanding the tools being used by criminals, we can better defend our nations, our critical infrastructures and our citizens. This ebook will provide readers with a new understanding of the rapidly developing cyber threat landscape and practical insights into how they can protect their data and computing infrastructures. Download now.
There's been a rapid shift from broad, scattershot attacks to advanced target attacks that have had serious consequences for victim organisations. The increased use of spear phishing is directly related to the fact that it works, as traditional security defences simply do not stop these types of attacks. This paper provides a detailed look at how spear phishing is used within advanced attacks and the key capabilities organisations need in order to effectively combat these emerging and evolving threats.
Copyright 2013 IDG Communications. ABN 14 001 592 650. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited.