Cyber attacks themselves are becoming more complex,
composed of multiple layers and techniques, each outsourced to specialty groups, ensuring
zero-day effects. This they achieve by making sure nothing stays constant. Each stage
in the attack changes by leveraging morphing techniques, such as dynamic DNS,
fresh URLs for command and control (CnC), self-destruct tools, and more.
Yesterday’s
zero-day code has already been packaged and sold to other cyber criminals for use in
secondary campaigns. In short, the threat landscape’s rate of change is accelerating
rapidly, increasing the security gaps organizations must deal with and leaving them more
exposed than ever before. As surprising as it may sound, the “new” tactics of cyber
criminals are not as new as you might think. Attackers actually recycle many of the
same attack components. In fact, as many as 90 percent of these so-called “new”
attacks can be prevented simply by correctly using existing security technologies as part
of an end-to-end cybersecurity plan. Attackers typically use the most proven forms of
attack because they work. And they work because organizations are often several
steps behind in patching their systems and updating their defenses against the latest
attack methods. Cybercrime has become a booming industry, accelerating in
the last 5 years, complete with automated tools, customer support, and guarantees
for product effectiveness.The commoditization of new attacks and weaponized tools
means that even the most amateur hacker can now effectively deliver
professional-level threats into a targeted organization. Share your comments on PAN's assessment of
cyber security with the Cloud and Cyber Security Center. Download the PAN
report at: www.paloaltonetworks.com
No comments:
Post a Comment