SlideShare une entreprise Scribd logo
1  sur  14
Cybersecurity
Threats You Should
Know About in 2018
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
Every year, Microsoft collects security and threat intelligence
from their global network and compiles the trends into the
Microsoft Security Intelligence Report.
To keep up with the always evolving landscape, the
Security Intelligence Report provides a thorough analysis of
security threats and how to best mitigate the top attack types.
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
This year’s report investigates three main topics
Botnets
Easy Mark Attack Methods
Ransomware
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
Botnets
Bots are programs that allow attackers
to infect and take control of computers,
and botnets are a network of those bots
controlled by command-and-control
(C&C) servers.
On November 29, 2017, Microsoft’s
Digital Crimes Unit tackled a leading
botnet that infected more than 23 million
IP addresses: Gamarue.
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
Botnets
Microsoft analyzed over 44,000 malware samples that revealed
Gamarue’s sprawling infrastructure.
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
Botnets
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
Easy Mark Attack Methods
With advancing security
solutions, hackers are more
apt to go after easy targets
through social engineering
and are constantly evolving
their tactics for maximum
efficiency.
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
Easy Mark Attack Methods
Here is one example of low-hanging fruit.
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
Easy Mark Attack Methods
Here is another example of low-hanging fruit.
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
Ransomware
Ransomware infects and
encrypts files (and sometimes
entire disks) to prevent
access until a ransom is paid
– and there’s no guarantee
victims will regain access.
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
Ransomware
Ransomware made a real-world impact in 2017, bringing down critical
services like hospitals, transportation, and traffic systems. Here are
few of the unprecedented and devastating ransomware families
responsible for the 2017 attacks:
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
Ransomware
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
Learn About Recent Cyberthreats
Download the full Microsoft Security Intelligence Report,
Volume 23 for more security insights.
www.microsoft.com/sir
© 2018 Microsoft Corporation. All rights reserved. This document is
for informational purposes only.
Microsoft makes no warranties, express or implied, with respect to
the information presented here.

Contenu connexe

Tendances

Home cyber security
Home cyber securityHome cyber security
Home cyber securityMichael File
 
Cyber Security Research Project Topics
Cyber Security Research Project TopicsCyber Security Research Project Topics
Cyber Security Research Project TopicsMatlab Simulation
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityHome
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident ResponsePECB
 
Prince banton cybercrime presentation
Prince banton cybercrime presentationPrince banton cybercrime presentation
Prince banton cybercrime presentationPrinceBanton1
 
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Damir Delija
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Netpluz Asia Pte Ltd
 
Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCBIZ, Inc.
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 ChallengesLeandro Bennaton
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptxPranavRaj96
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web ThreatsKim Jensen
 
NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...
NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...
NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...North Texas Chapter of the ISSA
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTAimee Shuck
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahadaliuet
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and securityDEEKSHAASHOKA
 

Tendances (20)

Cyber attacks in 2021
Cyber attacks in 2021Cyber attacks in 2021
Cyber attacks in 2021
 
Home cyber security
Home cyber securityHome cyber security
Home cyber security
 
Cyber Security Research Project Topics
Cyber Security Research Project TopicsCyber Security Research Project Topics
Cyber Security Research Project Topics
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security.pptx
Cyber security.pptxCyber security.pptx
Cyber security.pptx
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
 
Prince banton cybercrime presentation
Prince banton cybercrime presentationPrince banton cybercrime presentation
Prince banton cybercrime presentation
 
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
 
Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measures
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptx
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web Threats
 
NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...
NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...
NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahad
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 

Similaire à Cybersecurity threats you should know about in 2018

Microsoft Digital Defense Report 2022.pdf
Microsoft Digital Defense Report 2022.pdfMicrosoft Digital Defense Report 2022.pdf
Microsoft Digital Defense Report 2022.pdfNirenj George
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019Omar Bshara
 
2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling final2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling finalMARIUS EUGEN OPRAN
 
Ce hv8 module 13 hacking web applications
Ce hv8 module 13 hacking web applications Ce hv8 module 13 hacking web applications
Ce hv8 module 13 hacking web applications Mehrdad Jingoism
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security reportMarco Antonio Agnese
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...Cyber Security Alliance
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisIRJET Journal
 
Microsoft Digital Defense Executive Summary-2022
Microsoft Digital Defense Executive Summary-2022Microsoft Digital Defense Executive Summary-2022
Microsoft Digital Defense Executive Summary-2022Kevin Fream
 
The IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence IndexThe IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence IndexKanishka Ramyar
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec Technology and Consulting
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec Technology and Consulting
 
2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat Report2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat ReportRapidSSLOnline.com
 
HCA 530, Week 2, Symantec 2016 threat report
HCA 530, Week 2, Symantec 2016 threat reportHCA 530, Week 2, Symantec 2016 threat report
HCA 530, Week 2, Symantec 2016 threat reportMatthew J McMahon
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityIRJET Journal
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Conkarenahmanny4c
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxcroysierkathey
 

Similaire à Cybersecurity threats you should know about in 2018 (20)

Microsoft Digital Defense Report 2022.pdf
Microsoft Digital Defense Report 2022.pdfMicrosoft Digital Defense Report 2022.pdf
Microsoft Digital Defense Report 2022.pdf
 
Sel03129 usen
Sel03129 usenSel03129 usen
Sel03129 usen
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019
 
2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling final2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling final
 
original.pdf
original.pdforiginal.pdf
original.pdf
 
Ce hv8 module 13 hacking web applications
Ce hv8 module 13 hacking web applications Ce hv8 module 13 hacking web applications
Ce hv8 module 13 hacking web applications
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security report
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
Microsoft Digital Defense Executive Summary-2022
Microsoft Digital Defense Executive Summary-2022Microsoft Digital Defense Executive Summary-2022
Microsoft Digital Defense Executive Summary-2022
 
The IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence IndexThe IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence Index
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat Report2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat Report
 
Istr 21-2016-en
Istr 21-2016-enIstr 21-2016-en
Istr 21-2016-en
 
HCA 530, Week 2, Symantec 2016 threat report
HCA 530, Week 2, Symantec 2016 threat reportHCA 530, Week 2, Symantec 2016 threat report
HCA 530, Week 2, Symantec 2016 threat report
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
 
ISTR 23: Internet Security Threat Report
ISTR 23: Internet Security Threat Report ISTR 23: Internet Security Threat Report
ISTR 23: Internet Security Threat Report
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
 

Plus de Microsoft

Modern Finance at Microsoft US
Modern Finance at Microsoft USModern Finance at Microsoft US
Modern Finance at Microsoft USMicrosoft
 
Modern Marketing: The Case of Microsoft US
Modern Marketing: The Case of Microsoft USModern Marketing: The Case of Microsoft US
Modern Marketing: The Case of Microsoft USMicrosoft
 
Norwegian Refugee Council
Norwegian Refugee CouncilNorwegian Refugee Council
Norwegian Refugee CouncilMicrosoft
 
Millennials and the Next Generation of IT
Millennials and the Next Generation of ITMillennials and the Next Generation of IT
Millennials and the Next Generation of ITMicrosoft
 
7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene  7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene Microsoft
 
Microsoft to Acquire LinkedIn: Overview for Investors
Microsoft to Acquire LinkedIn: Overview for InvestorsMicrosoft to Acquire LinkedIn: Overview for Investors
Microsoft to Acquire LinkedIn: Overview for InvestorsMicrosoft
 
Reimagining Business Operations
Reimagining Business OperationsReimagining Business Operations
Reimagining Business OperationsMicrosoft
 
Bring Your Own Device
Bring Your Own DeviceBring Your Own Device
Bring Your Own DeviceMicrosoft
 
Office365 Security Task Force
Office365 Security Task ForceOffice365 Security Task Force
Office365 Security Task ForceMicrosoft
 
5 Ways Affordable Innovation Can Revolutionize your Business
5 Ways Affordable Innovation Can Revolutionize your Business5 Ways Affordable Innovation Can Revolutionize your Business
5 Ways Affordable Innovation Can Revolutionize your BusinessMicrosoft
 
Top 5 Note Taking Tips from Future Innovators
Top 5 Note Taking Tips from Future InnovatorsTop 5 Note Taking Tips from Future Innovators
Top 5 Note Taking Tips from Future InnovatorsMicrosoft
 
Empowering Employee Engagement: Creating an Engaged Workforce through Afforda...
Empowering Employee Engagement: Creating an Engaged Workforce through Afforda...Empowering Employee Engagement: Creating an Engaged Workforce through Afforda...
Empowering Employee Engagement: Creating an Engaged Workforce through Afforda...Microsoft
 
Media in Transformation: A Technology Perspective
Media in Transformation: A Technology PerspectiveMedia in Transformation: A Technology Perspective
Media in Transformation: A Technology PerspectiveMicrosoft
 
Total Economic Impact of Microsoft Office 365 Forrester Study
Total Economic Impact of Microsoft Office 365 Forrester StudyTotal Economic Impact of Microsoft Office 365 Forrester Study
Total Economic Impact of Microsoft Office 365 Forrester StudyMicrosoft
 
Integrated Customer Service Maximization Experience Vision Demonstrator
Integrated Customer Service Maximization Experience Vision DemonstratorIntegrated Customer Service Maximization Experience Vision Demonstrator
Integrated Customer Service Maximization Experience Vision DemonstratorMicrosoft
 
Ignite Theater: Microsoft Enterprise Services Connected Collaboration Approach
Ignite Theater: Microsoft Enterprise Services Connected Collaboration ApproachIgnite Theater: Microsoft Enterprise Services Connected Collaboration Approach
Ignite Theater: Microsoft Enterprise Services Connected Collaboration ApproachMicrosoft
 
The Digital Airline
The Digital AirlineThe Digital Airline
The Digital AirlineMicrosoft
 
Driving results through a connected omni-channel retail sales experience
Driving results through a connected omni-channel retail sales experienceDriving results through a connected omni-channel retail sales experience
Driving results through a connected omni-channel retail sales experienceMicrosoft
 
Making Your Marketing More Effective
Making Your Marketing More Effective Making Your Marketing More Effective
Making Your Marketing More Effective Microsoft
 
Office Ergonomics: Dos and Don'ts
Office Ergonomics: Dos and Don'tsOffice Ergonomics: Dos and Don'ts
Office Ergonomics: Dos and Don'tsMicrosoft
 

Plus de Microsoft (20)

Modern Finance at Microsoft US
Modern Finance at Microsoft USModern Finance at Microsoft US
Modern Finance at Microsoft US
 
Modern Marketing: The Case of Microsoft US
Modern Marketing: The Case of Microsoft USModern Marketing: The Case of Microsoft US
Modern Marketing: The Case of Microsoft US
 
Norwegian Refugee Council
Norwegian Refugee CouncilNorwegian Refugee Council
Norwegian Refugee Council
 
Millennials and the Next Generation of IT
Millennials and the Next Generation of ITMillennials and the Next Generation of IT
Millennials and the Next Generation of IT
 
7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene  7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene
 
Microsoft to Acquire LinkedIn: Overview for Investors
Microsoft to Acquire LinkedIn: Overview for InvestorsMicrosoft to Acquire LinkedIn: Overview for Investors
Microsoft to Acquire LinkedIn: Overview for Investors
 
Reimagining Business Operations
Reimagining Business OperationsReimagining Business Operations
Reimagining Business Operations
 
Bring Your Own Device
Bring Your Own DeviceBring Your Own Device
Bring Your Own Device
 
Office365 Security Task Force
Office365 Security Task ForceOffice365 Security Task Force
Office365 Security Task Force
 
5 Ways Affordable Innovation Can Revolutionize your Business
5 Ways Affordable Innovation Can Revolutionize your Business5 Ways Affordable Innovation Can Revolutionize your Business
5 Ways Affordable Innovation Can Revolutionize your Business
 
Top 5 Note Taking Tips from Future Innovators
Top 5 Note Taking Tips from Future InnovatorsTop 5 Note Taking Tips from Future Innovators
Top 5 Note Taking Tips from Future Innovators
 
Empowering Employee Engagement: Creating an Engaged Workforce through Afforda...
Empowering Employee Engagement: Creating an Engaged Workforce through Afforda...Empowering Employee Engagement: Creating an Engaged Workforce through Afforda...
Empowering Employee Engagement: Creating an Engaged Workforce through Afforda...
 
Media in Transformation: A Technology Perspective
Media in Transformation: A Technology PerspectiveMedia in Transformation: A Technology Perspective
Media in Transformation: A Technology Perspective
 
Total Economic Impact of Microsoft Office 365 Forrester Study
Total Economic Impact of Microsoft Office 365 Forrester StudyTotal Economic Impact of Microsoft Office 365 Forrester Study
Total Economic Impact of Microsoft Office 365 Forrester Study
 
Integrated Customer Service Maximization Experience Vision Demonstrator
Integrated Customer Service Maximization Experience Vision DemonstratorIntegrated Customer Service Maximization Experience Vision Demonstrator
Integrated Customer Service Maximization Experience Vision Demonstrator
 
Ignite Theater: Microsoft Enterprise Services Connected Collaboration Approach
Ignite Theater: Microsoft Enterprise Services Connected Collaboration ApproachIgnite Theater: Microsoft Enterprise Services Connected Collaboration Approach
Ignite Theater: Microsoft Enterprise Services Connected Collaboration Approach
 
The Digital Airline
The Digital AirlineThe Digital Airline
The Digital Airline
 
Driving results through a connected omni-channel retail sales experience
Driving results through a connected omni-channel retail sales experienceDriving results through a connected omni-channel retail sales experience
Driving results through a connected omni-channel retail sales experience
 
Making Your Marketing More Effective
Making Your Marketing More Effective Making Your Marketing More Effective
Making Your Marketing More Effective
 
Office Ergonomics: Dos and Don'ts
Office Ergonomics: Dos and Don'tsOffice Ergonomics: Dos and Don'ts
Office Ergonomics: Dos and Don'ts
 

Dernier

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 

Dernier (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 

Cybersecurity threats you should know about in 2018

  • 2. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 Every year, Microsoft collects security and threat intelligence from their global network and compiles the trends into the Microsoft Security Intelligence Report. To keep up with the always evolving landscape, the Security Intelligence Report provides a thorough analysis of security threats and how to best mitigate the top attack types.
  • 3. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 This year’s report investigates three main topics Botnets Easy Mark Attack Methods Ransomware
  • 4. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 Botnets Bots are programs that allow attackers to infect and take control of computers, and botnets are a network of those bots controlled by command-and-control (C&C) servers. On November 29, 2017, Microsoft’s Digital Crimes Unit tackled a leading botnet that infected more than 23 million IP addresses: Gamarue.
  • 5. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 Botnets Microsoft analyzed over 44,000 malware samples that revealed Gamarue’s sprawling infrastructure.
  • 6. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 Botnets
  • 7. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 Easy Mark Attack Methods With advancing security solutions, hackers are more apt to go after easy targets through social engineering and are constantly evolving their tactics for maximum efficiency.
  • 8. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 Easy Mark Attack Methods Here is one example of low-hanging fruit.
  • 9. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 Easy Mark Attack Methods Here is another example of low-hanging fruit.
  • 10. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 Ransomware Ransomware infects and encrypts files (and sometimes entire disks) to prevent access until a ransom is paid – and there’s no guarantee victims will regain access.
  • 11. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 Ransomware Ransomware made a real-world impact in 2017, bringing down critical services like hospitals, transportation, and traffic systems. Here are few of the unprecedented and devastating ransomware families responsible for the 2017 attacks:
  • 12. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 Ransomware
  • 13. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 Learn About Recent Cyberthreats Download the full Microsoft Security Intelligence Report, Volume 23 for more security insights. www.microsoft.com/sir
  • 14. © 2018 Microsoft Corporation. All rights reserved. This document is for informational purposes only. Microsoft makes no warranties, express or implied, with respect to the information presented here.

Notes de l'éditeur

  1. Please update icons with those found in the source file
  2. Please update image with the asset in the source file
  3. Please update image with the asset in the source file
  4. Please update image with the asset in the source file
  5. Please update image with the asset in the source file
  6. Please update image with the asset in the source file
  7. Please update image with the asset in the source file
  8. Please update image with the asset in the source file
  9. Please update image with the asset in the source file
  10. Please update image with the asset in the source file