SHARE
Facebook X Pinterest WhatsApp

11 Important Facts to Know About IT Security

IT security report Number of Exploit Kits Drops Sharply Law enforcement is becoming more effective, but new kits are always being developed. The number of exploit kits has dropped by 87% since the alleged creator of the widely popular Blackhole exploit kit was arrested last year. Know Your Exploits Not every vulnerability translates into an […]

Written By
thumbnail
Michael Vizard
Michael Vizard
Aug 12, 2014
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

IT security report

1 - Number of Exploit Kits Drops SharplyNumber of Exploit Kits Drops Sharply

Law enforcement is becoming more effective, but new kits are always being developed. The number of exploit kits has dropped by 87% since the alleged creator of the widely popular Blackhole exploit kit was arrested last year.

2 - Know Your ExploitsKnow Your Exploits

Not every vulnerability translates into an actual exploit. Of the 2,528 vulnerability alerts published from January to June 2014, 28 were identified as being actively exploited.

3 - Top IT Security TargetsTop IT Security Targets

With most attacks focused on applications, the rest of the IT environment often gets overlooked. Applications only account for 31% of the attacks; the rest are aimed elsewhere.

4 - Man-in-the-Browser Attacks on the RiseMan-in-the-Browser Attacks on the Rise

Nearly 94 percent of customer networks have traffic going to Websites that host malware. Domain Name System (DNS) requests for host names where the IP address to which the host name resolves are reported to be associated with the distribution of Palevo, SpyEye, and Zeus malware families that incorporate man-in-the-browser (MiTB) functionality.

5 - Botnet Hide and SeekBotnet Hide and Seek

Few legitimate outbound connection attempts from enterprises should seek dynamic DNS (DDNS) domains. Nearly 70% of networks were identified as issuing DNS queries for DDNS. This shows evidence of networks misused or compromised, with botnets using DDNS to alter their IP address to avoid detection/blacklist.

6 - Encrypting Stolen DataEncrypting Stolen Data

Hackers cover their tracks by “exfiltrating data” using encrypted channels to avoid detection. Nearly 44% of customer networks have been identified as issuing DNS requests for sites and domains with devices that provide encrypted channel services.

7 - Java Still a Major Security ConcernJava Still a Major Security Concern

Security is one of the major reasons there has been a proliferation of programming language adoption. Java exploits rose to 93% of all indicators of compromise (as of May 2014.)

8 - Spam on the Rise AgainSpam on the Rise Again

After a decline last year, spam is back. Spam volumes have increased to the point that spam is now at its highest level since late 2010.

9 - Emerging Threat VectorsEmerging Threat Vectors

Hackers are looking for the latest, weakest link. Attacks aimed at WordPress sites, POS terminals as well as social engineering tactics and “malvertising” are all on the rise.

10 - Vertical Industries Under AttackVertical Industries Under Attack

Hackers are shifting to where the intellectual property is. Media and publishing led the industry verticals, posting nearly four times the median Web malware encounters. The pharmaceutical and chemical industry is now second while aviation slid into third place.

11 - Vertical Industry Attacks by GeographyVertical Industry Attacks by Geography

The top most affected verticals by region were media and publishing in the Americas; food and beverage in the EMEA (Europe, the Middle East and Africa) region, and insurance in APJC (Asia-Pacific, China, Japan and India).

Recommended for you...

Cork Cyber Launches Vantage Platform for Cyber Risk Intelligence
Luis Millares
Nov 17, 2025
Rubrik Finds Declining Identity Resilience as AI Agents Rise
Luis Millares
Nov 13, 2025
LevelBlue CIO on Importance of the Human Element in Security
Jordan Smith
Nov 11, 2025
SentinelOne Debuts Wayfinder Threat Detection and Response Services
Jordan Smith
Nov 6, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.