threat landscape report...threat landscape report for q2 2018 it’s key to use threat intelligence...
Post on 01-Aug-2020
6 Views
Preview:
TRANSCRIPT
1. LEVERAGE MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE
2. INTEGRATE ACROSS THE ENTIRE SECURITY ARCHITECTURE
3. AUTOMATE RESPONSE FOR FAST REMEDIATION
“DRUPALGEDDON 2” DETECTIONS SHOWED A THOUSAND-FOLD
INCREASE OVER 24 HOURS
ESPECIALLY POPULAR CRYPTOJACKING TARGETS ARE
MEDIA DEVICES DUE TO POWERFUL GPUS
IOT DEVICES SERVE AS A BASE
FOR CRYPTOJACKING
96% SAW SEVERE EXPLOITS
THREAT LANDSCAPE
REPORT
DOWNLOAD REPORT
CAN YOU PATCH ‘EM ALL?
AGILE DEVELOPMENT IS ON THE LOOSE
DRUPAL EXPLOIT LED TO CRYPTOJACKING
THREE THINGS YOUR ADVANCED THREAT PROTECTION MUST DO
Q2 2018
AGILE DEVELOPMENT USED IN CONJUNCTION WITH POLYMORPHISM
A NEW RANSOMWARE SECURITY TOOL WAS NEGATED WITHIN 48 HOURS OF RELEASE
THIS MALWARE IS MORE DIFFICULT
TO DETECT
KNOWN VULNERABILITIES (CVEs)
103,786
ONLY 5.7% OF KNOWN VULNERABILITIES
WERE TARGETED
Read the Complete Threat Landscape Report for Q2 2018
IT’S KEY TO USE THREAT INTELLIGENCE TO PRIORITIZE PATCHING
top related