Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cybersecurity threats you should know about in 2018

3,741 views

Published on

To keep up with the always evolving landscape, the
Security Intelligence Report provides a thorough analysis of security threats and how to best mitigate the top attack types.

Published in: Technology
  • Hello! Get Your Professional Job-Winning Resume Here - Check our website! https://vk.cc/818RFv
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

Cybersecurity threats you should know about in 2018

  1. 1. Cybersecurity Threats You Should Know About in 2018
  2. 2. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 Every year, Microsoft collects security and threat intelligence from their global network and compiles the trends into the Microsoft Security Intelligence Report. To keep up with the always evolving landscape, the Security Intelligence Report provides a thorough analysis of security threats and how to best mitigate the top attack types.
  3. 3. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 This year’s report investigates three main topics Botnets Easy Mark Attack Methods Ransomware
  4. 4. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 Botnets Bots are programs that allow attackers to infect and take control of computers, and botnets are a network of those bots controlled by command-and-control (C&C) servers. On November 29, 2017, Microsoft’s Digital Crimes Unit tackled a leading botnet that infected more than 23 million IP addresses: Gamarue.
  5. 5. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 Botnets Microsoft analyzed over 44,000 malware samples that revealed Gamarue’s sprawling infrastructure.
  6. 6. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 Botnets
  7. 7. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 Easy Mark Attack Methods With advancing security solutions, hackers are more apt to go after easy targets through social engineering and are constantly evolving their tactics for maximum efficiency.
  8. 8. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 Easy Mark Attack Methods Here is one example of low-hanging fruit.
  9. 9. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 Easy Mark Attack Methods Here is another example of low-hanging fruit.
  10. 10. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 Ransomware Ransomware infects and encrypts files (and sometimes entire disks) to prevent access until a ransom is paid – and there’s no guarantee victims will regain access.
  11. 11. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 Ransomware Ransomware made a real-world impact in 2017, bringing down critical services like hospitals, transportation, and traffic systems. Here are few of the unprecedented and devastating ransomware families responsible for the 2017 attacks:
  12. 12. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 Ransomware
  13. 13. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 Learn About Recent Cyberthreats Download the full Microsoft Security Intelligence Report, Volume 23 for more security insights. www.microsoft.com/sir
  14. 14. © 2018 Microsoft Corporation. All rights reserved. This document is for informational purposes only. Microsoft makes no warranties, express or implied, with respect to the information presented here.

×