Netherlands: Security

cisco-midyear-security-report-2016

Issue link: http://hub-nl.insight.com/i/724470

Contents of this Issue

Navigation

Page 1 of 58

2016 Midyear Cybersecurity Report 1 | Table of Contents Table of Contents EXECUTIVE SUMMARY AND MAJOR FINDINGS .... 2 INTRODUCTION ..................................................... 5 CYBERCRIME TREND SPOTLIGHT: RANSOMWARE ... 6 Ransomware: A Massive Revenue Generator with Undeniable Staying Power .............................................................................. 7 The Evolution of Ransomware: Self-Propagation ...................... 9 Vulnerabilities ............................................................................. 11 A False Sense of Security About Secure Connections ................ 12 TIME TO OPERATE ................................................13 Attack Vectors: Client Side ....................................................... 14 PDF and Java Attacks on the Decline .......................................... 14 Leading Exploit Kits Continue to Rely on Flash ............................ 15 Exploit Kit Uses Tor to Hide Communication ................................ 16 Adversaries See Value in Server-Based Campaigns ................... 16 JBoss: Vulnerabilities in Infrastructure Provide Attackers with Time to Operate ................................................................... 18 Spam Volume Remains Relatively Stable Worldwide ................... 19 A Return to Blacklists? Attackers' Embrace of HTTPS Complicates Defenders' Investigations ........................................ 21 Malvertising as a Service: High-Efficiency Infections Are the Name of the Game ......................................................... 23 Web Attack Methods: Setting Up Ransomware for Success ....... 25 TIME TO SECURE ................................................. 26 Time to Patch: Lag Times Between Patch and Upgrade Availability and Implementation Create Security Gaps ................. 27 Aging Infrastructure: Ransomware's Rise Makes Patching Long-Standing Vulnerabilities an Urgent Imperative .................... 30 Encryption: HTTPS Traffic Stable in 2016 … So Far ..................... 35 TLS Encrypts Payloads but Doesn't Hide Malware Behavior ........ 37 Time to Detection Trends Highlight a Heated "Arms Race" ......... 40 Incident Response: Practices That Impair Organizational Security ... 44 Ransomware Attacks in Healthcare Offer Security Hygiene Lessons for All Organizations ........................................ 45 GLOBAL PERSPECTIVE AND SECURITY RECOMMENDATIONS .......................................... 46 Regional Overview of Web Block Activity .................................... 47 Vertical Risk of Malware Encounters: No Industry Is Safe ............ 49 Geopolitical Update: Governments and Businesses Navigate the Data Protection Dilemma ........................................ 50 Security Recommendations ......................................................... 52 Indicators of Compromise Are Not Threat Intelligence ................ 53 CONCLUSION ...................................................... 54 ABOUT CISCO ..................................................... 55 Contributors to the Cisco 2016 Midyear Cybersecurity Report .... 55

Articles in this issue

Archives of this issue

view archives of Netherlands: Security - cisco-midyear-security-report-2016