Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. View our editorial policy here.

IT security report

1 - Number of Exploit Kits Drops SharplyNumber of Exploit Kits Drops Sharply

Law enforcement is becoming more effective, but new kits are always being developed. The number of exploit kits has dropped by 87% since the alleged creator of the widely popular Blackhole exploit kit was arrested last year.

2 - Know Your ExploitsKnow Your Exploits

Not every vulnerability translates into an actual exploit. Of the 2,528 vulnerability alerts published from January to June 2014, 28 were identified as being actively exploited.

3 - Top IT Security TargetsTop IT Security Targets

With most attacks focused on applications, the rest of the IT environment often gets overlooked. Applications only account for 31% of the attacks; the rest are aimed elsewhere.

4 - Man-in-the-Browser Attacks on the RiseMan-in-the-Browser Attacks on the Rise

Nearly 94 percent of customer networks have traffic going to Websites that host malware. Domain Name System (DNS) requests for host names where the IP address to which the host name resolves are reported to be associated with the distribution of Palevo, SpyEye, and Zeus malware families that incorporate man-in-the-browser (MiTB) functionality.

5 - Botnet Hide and SeekBotnet Hide and Seek

Few legitimate outbound connection attempts from enterprises should seek dynamic DNS (DDNS) domains. Nearly 70% of networks were identified as issuing DNS queries for DDNS. This shows evidence of networks misused or compromised, with botnets using DDNS to alter their IP address to avoid detection/blacklist.

6 - Encrypting Stolen DataEncrypting Stolen Data

Hackers cover their tracks by “exfiltrating data” using encrypted channels to avoid detection. Nearly 44% of customer networks have been identified as issuing DNS requests for sites and domains with devices that provide encrypted channel services.

7 - Java Still a Major Security ConcernJava Still a Major Security Concern

Security is one of the major reasons there has been a proliferation of programming language adoption. Java exploits rose to 93% of all indicators of compromise (as of May 2014.)

8 - Spam on the Rise AgainSpam on the Rise Again

After a decline last year, spam is back. Spam volumes have increased to the point that spam is now at its highest level since late 2010.

9 - Emerging Threat VectorsEmerging Threat Vectors

Hackers are looking for the latest, weakest link. Attacks aimed at WordPress sites, POS terminals as well as social engineering tactics and “malvertising” are all on the rise.

10 - Vertical Industries Under AttackVertical Industries Under Attack

Hackers are shifting to where the intellectual property is. Media and publishing led the industry verticals, posting nearly four times the median Web malware encounters. The pharmaceutical and chemical industry is now second while aviation slid into third place.

11 - Vertical Industry Attacks by GeographyVertical Industry Attacks by Geography

The top most affected verticals by region were media and publishing in the Americas; food and beverage in the EMEA (Europe, the Middle East and Africa) region, and insurance in APJC (Asia-Pacific, China, Japan and India).

Subscribe for updates!

You must input a valid work email address.
You must agree to our terms.