Skip to main content

Detecting and dealing with the stealthiest cyberattacks

posted onApril 25, 2016
by l33tdawg

Cyberattacks are getting smarter and stealthier as criminals and nation states use a combination of complex techniques to evade detection. The accepted reality now is that traditional protection techniques that rely on static signatures – such as Anti-Virus (AV) – or take a narrow view and ignore vectors like fileless based attacks, are simply no match for today’s threat landscape. So where does this leave organisations trying to protect against new, ever evolving variants of malware or exploits?

The endpoint remains one of the prime targets in any attack – which comprises a host of corporate devices from laptops to tablets, smartphones, servers or even a printer. Recent evidence points to the fact that these continue to be an organisation’s Achilles heel when it comes to security.

The endpoint acts as a gateway for hackers on their journey within the network. Once malware has executed within an endpoint, attackers can move freely within it. So the detection and protection has to occur on endpoints themselves. This is more important than ever in the era of BYOD, as users can easily connect their own devices to the corporate network. If they then connect an unsanctioned and infected device, the malware can move freely within the enterprise.

Source

Tags

Security

You May Also Like

Recent News

Friday, November 29th

Tuesday, November 19th

Friday, November 8th

Friday, November 1st

Tuesday, July 9th

Wednesday, July 3rd

Friday, June 28th

Thursday, June 27th

Thursday, June 13th

Wednesday, June 12th

Tuesday, June 11th

Simplenews subscription

Stay informed - subscribe to our newsletter.
The subscriber's email address.
Keeping Knowledge Free for Over a Decade

Copyright © 2018 Hack In The Box. All rights reserved.

36th Floor, Menara Maxis, Kuala Lumpur City Centre 50088 Kuala Lumpur Malaysia
Tel: +603-2615-7299 Fax: +603-2615-0088