Firewall News

Top Menu

  • Home
  • Our Blog
  • Contact Us

Main Menu

  • Software Updates
  • Alerts & Bugs
  • Out of the Box
  • Home
  • Our Blog
  • Contact Us

Firewall News

Firewall News

  • Software Updates
    • WatchGuard logo

      TDR 6.0.0 is now integrated into WatchGuard Cloud

      04/01/2021
      0
    • Sophos Logo

      XG Firewall 17.5 MR14 Released

      30/07/2020
      0
    • Sophos Logo

      Sophos Firewall Manager SFM 17.1 MR4 Released

      27/07/2020
      0
    • Sophos Logo

      Sophos Enterprise console - Endpoint Security and Control v10.8.9 for Windows has ...

      16/07/2020
      0
    • Sophos Logo

      Sophos iView v3 MR-2 Released

      07/07/2020
      0
    • Sophos Logo

      SD-RED Firmware 3.0.002 Pattern Update

      06/07/2020
      0
    • Sophos Logo

      XG Firewall 17.5 MR13 Released

      06/07/2020
      0
    • Sophos Logo

      End-of-Life (EoL) announcement for old firmware v17 and v17.1 for XG Firewall

      03/07/2020
      0
    • WatchGuard logo

      Fireware 12.5.4 Now Available

      01/07/2020
      0
  • Alerts & Bugs
    • Sophos Logo

      Advisory: Sophos Central Maintenance scheduled for Saturday, April 2nd, 2022

      29/03/2022
      0
    • Sophos Logo

      Sophos: Important Product Lifecycle Updates

      03/03/2022
      0
    • WatchGuard logo

      WatchGuard Support Alert

      23/02/2022
      0
    • Sophos Logo

      Sophos: Important Product Lifecycle Reminder

      03/02/2022
      0
    • Sophos Logo

      Sophos: Product Lifecycle Information: Extended Support for Windows 7 and Windows Server ...

      31/01/2022
      0
    • Sophos Logo

      End-of-Life (EoL) announcement for Sophos SSL VPN Client

      29/11/2021
      0
    • WatchGuard logo

      WatchGuard: macOS Monterey 12.0.1 Does Not Support the AuthPoint Logon App

      09/11/2021
      0
    • Sophos Logo

      Sophos UTM Manager (SUM) End of Distribution

      04/11/2021
      0
    • WatchGuard logo

      WatchGuard: End of Sale Notice: AP420

      01/11/2021
      0
  • Out of the Box
    • WatchGuard’s Firebox T80 Earns 5-Star Rating in SC Labs Review

      17/11/2020
      0
    • WatchGuard Wins Big in CRN 2020 Tech Innovator Awards

      16/11/2020
      0
    • Coronavirus scams: what to look for and how to stop them

      02/04/2020
      0
    • Dell SonicWALL TZ 300

      Out the Box - Dell SonicWALL TZ 300

      05/07/2016
      0
    • Dell SonicWALL TZ SOHO

      Out the Box - Dell SonicWALL TZ SOHO

      05/07/2016
      0
    • WatchGuard Firebox T50

      WatchGuard Firebox T50

      31/03/2016
      0
    • WatchGuard Firebox M200

      WatchGuard Firebox M200

      31/03/2016
      0
FortinetNews
Home›News›Fortinet›Taking a Big Picture Look at the Cyber Threat Landscape

Taking a Big Picture Look at the Cyber Threat Landscape

By admin
22/06/2020
1380
0
Share:

Key Takeaways from Years of Battling Cyber Threats

The potential attack surface of organizations continues to expand, and the speed and sophistication of cyberattacks continue to make defending the network ever more challenging. With IT teams on constant alert, and much of their time spent putting out fires, it can be difficult for organizations to pause and look at the big picture. To help, we recently sat down digitally with two of FortiGuard Labs‘ top threat researchers, Douglas Jose Pereira dos Santos and Jonas Walker, who spend their days deeply entrenched in the threat landscape. They took some time to share what some of these attacks mean and how organizations can get out ahead of the constant assault of cyber warfare.

As you look back over your many years of research, what is one thing that comes to mind about the trajectory and history of the cyber threat landscape?

Jonas: The motivation of threat actors has changed dramatically. In the early days, the primary purpose of viruses was mainly research. Later, they were used to disable computers and delete files. In general, hacking was more about fame and prestige than money. However, it is worrying that leveraging emails to distribute malware – a strategy first invented several decades ago – is still very effective these days. 

Douglas: Yes. Not only that, but the fact that in 2020 (in comparison with the nineties and the early 2000’s) we rely much more on our digital assets, which makes those assets more alluring to attackers. If someone hacked into an email from a company years ago, the worst it could do is destroy or steal the data. That’s because far less of a company’s assets were digital. Now, with DX, the stakes are much higher for companies and cybercriminals alike. 

What has changed the most about today’s threats vs. the threats of ten or even just five years ago?

​​​​​Jonas: Most of the time, cyberattack goals are about money. Most breaches today are driven by cybercriminals who steal sensitive information to sell on the Dark Web, or encrypt systems and ask for a ransom. As a result, hacking has become much more sophisticated and lethal. For example, more than half of all attacks are managed by cybercrime organizations that are better organized than most companies. They have CEOs, account managers, and dedicated call centers that support the victims in paying ransoms. They approach their work like any business, except that their revenue streams are stolen data and extortion. Their new Cybercrime-as-a-Service ecosystem is one of the biggest reasons why the cybercrime industry grows dramatically and generates more than one trillion dollars in revenue every year.

Douglas: Over time, digital resources are increasingly interconnected. Malicious threat actors are capable of adapting very rapidly to their current surroundings, and are able to quickly penetrate systems which lack proper security implementations. And now, with significant improvements and innovations in computer hardware, software, and artificial intelligence, interconnectivity between systems has increased even further, which leads to a broader attack surface. And threats have become more sophisticated in every way. Now we have the so-called file-less attacks that don’t include a payload, per se, and live entirely in memory. This has been a very dramatic paradigm shift, especially for the AV industry.

Social engineering is still a very successful entryway for cybercriminals looking to launch their full threat arsenals. Why is that?

Jonas: Humans are and always will be the weakest link in any corporate IT security system. Even though so many corporations educate their employees using various awareness training, phishing techniques have evolved dramatically in recent years, making them increasingly difficult to detect by the average user. New polymorphic phishing attacks, for example, are highly effective and very difficult to defend against but quite easy for attackers to launch. Even for those cyberattackers without development skills, with the help of a credit card, they can purchase highly sophisticated automated toolkits on the darknet for a modest amount of money. For these attackers, all it takes is one employee to fall for a social engineering attack, and they have one foot in their victim’s network from which they can move laterally to their primary target. 

The trick is to remove humans out of the equation as much as possible. Organizations need to upgrade the secure email gateways and add Machine Learning (ML) to better detect email-borne threats, and add a tool like CDR (Content Disarm and Reconstruct) to neutralize those threats. ML should also be added to the analysis end of the equation as it is able to consume and correlate far more data than human analysts can process.

Douglas: Yes, and this is true not only for social engineered phishing attacks, but for all attacks: creativity for cyberattacks has no limits, and we know it. It might not be every week, but we do see new ways every other campaign. So on top of the lack of user awareness, new techniques and ways of luring victims are continuously being deployed.

What are some of the biggest game changing threats or threat techniques you can recall as you look back over time?

Jonas: One of the most lethal combinations is a sophisticated attack that targets humans when they are in a state of fear, uncertainty, and doubt. The current COVID-19 pandemic is a great example. The internet enables most people to do their own research, and sophisticated attackers are ahead of the curve. They have anticipated the generic behavior of individuals and prepared their campaigns for the events around us by stuffing the internet, and our in boxes, with disinformation, malicious files, and links to infected web pages. Ironically, we now live in a world where human viruses and cyber viruses cross attack paths. This is extremely effective, generating a lot of money while causing a tremendous amount of physical and monetary damage. 

Douglas: Yes, and if we look back further, the more we see researchers doing work on hardware-related vulnerabilities. I believe that it is very likely that we will see more game-changing vulnerabilities like Spectre, Meltdown, BlueBorne, and Broadpwn. Without true visibility and control over everything in their infrastructure, organizations will miss these threats when they breach their networks. 

Learn more about FortiGuard Labs threat research and the FortiGuard Security Subscriptions and Services portfolio. Sign up for the weekly Threat Brief from FortiGuard Labs. 

Learn more about Fortinet’s free cybersecurity training initiative or about the Fortinet Network Security Expert program, Network Security Academy program, and FortiVet program.

Previous Article

Advisory: Sophos Central Maintenance scheduled for Saturday, ...

Next Article

Sophos Named Best Security Company by SC ...

0
Shares
  • 0
  • +
  • 0
  • 0
  • 0
  • 0

Related articles More from author

  • NewsWatchGuard

    WatchGuard Wins Big in CRN 2020 Tech Innovator Awards

    16/11/2020
    By admin
  • WatchGuard logo
    News

    WatchGuard Firebox Cloud on AWS

    01/11/2017
    By admin
  • SonicWall Logo
    NewsSonicWALL

    SONICWALL FIREWALL ACHIEVES PERFECT EFFECTIVENESS SCORE, TESTED IN REAL-WORLD CONDITIONS VIA NETSECOPEN LABORATORY

    20/02/2020
    By admin
  • News

    Coronavirus and remote working: what you need to know

    12/03/2020
    By admin
  • Sophos PLC Awards
    News

    Sophos scores with Innovation in Technology award

    20/03/2018
    By admin
  • NewsTrendMicro

    NEW TECH: Trend Micro inserts ‘X’ factor into ‘EDR’ – endpoint detection and response

    14/08/2019
    By admin

  • SonicWall Logo
    NewsSonicWALL

    SONICWALL, LOS ANGELES COUNTY METROPOLITAN TRANSPORTATION AUTHORITY SECURE BUSINESS-CRITICAL COMMUNICATIONS WITH REAL-TIME SAAS SECURITY INITIATIVE

  • MerakiNews

    LANDING ON GREEN WITH MERAKI AT THE U.S. OPEN

  • SonicWall Logo
    Alerts & BugsSonicWALL

    Security Advisory: SonicOS Vulnerability In Firewall Web Management Interface

Timeline

  • 29/03/2022

    Advisory: Sophos Central Maintenance scheduled for Saturday, April 2nd, 2022

  • 03/03/2022

    Sophos: Important Product Lifecycle Updates

  • 01/03/2022

    Shoring up your cybersecurity posture in light of ongoing crisis

  • 23/02/2022

    WatchGuard Support Alert

  • 03/02/2022

    Sophos: Important Product Lifecycle Reminder

Sponsored Links

Latest Comments

  • Paul Sillars
    on
    21/06/2016
    I received this in an email this morning, it was the first I heard about it ...

    Dell Software Group sold to help fund looming EMC deal

  • Paul Sillars
    on
    20/06/2016
    This is going to be an interesting one to watch. Especially after today's announcement that ...

    Ingram Micro gets distribution access to Dell’s security range in Australia

Find us on Facebook

Firewall.News Logo

This site serves more as a reference point for some of the major security vendor's updates and product/press releases

It will never be a definitive list, but it helps our customers keep up to date and also allows us to express our comment and observations as well.

About us

  • PO Box 451, North Lakes, Queensland, 4509, Australia
  • [email protected]
  • Recent

  • Popular

  • Comments

  • Sophos Logo

    Advisory: Sophos Central Maintenance scheduled for Saturday, April 2nd, 2022

    By admin
    29/03/2022
  • Sophos Logo

    Sophos: Important Product Lifecycle Updates

    By admin
    03/03/2022
  • Shoring up your cybersecurity posture in light of ongoing crisis

    By admin
    01/03/2022
  • WatchGuard logo

    WatchGuard Support Alert

    By admin
    23/02/2022
  • Dell SonicWALL Supermassive

    Ingram Micro gets distribution access to Dell’s security range in Australia

    By admin
    14/06/2016
  • Francisco Partners and Elliott Management to Acquire the Dell Software Group

    Dell Software Group sold to help fund looming EMC deal

    By admin
    21/06/2016
  • WatchGuard Firebox M500 – The Cure for HTTPS Performance Headaches

    By admin
    05/03/2015
  • Sophos Logo

    Advisory: Sophos Central Maintenance scheduled for Saturday, April 2nd, 2022

    By admin
    29/03/2022
  • Paul Sillars
    on
    21/06/2016

    Dell Software Group sold to help fund looming EMC deal

    I received this in ...
  • Paul Sillars
    on
    20/06/2016

    Ingram Micro gets distribution access to Dell’s security range in Australia

    This is going to ...

Follow Me

  • Contact
  • About Us
  • Home