Threat Intelligence provides the power to protect your organization against emerging threats.
SecureWorks® Counter Threat Unit™ (CTU) security intelligence research team delivers this power by offering learnings and observations of the cyber threat landscape in a monthly Threat Intelligence Executive Summary.
In this report you will learn the latest security trends from the previous month that were identified as significant by the CTU™ research team. The Executive Monthly report covers trends as they relate to vulnerabilities, malware, threat actors and methodologies, and law enforcement and government.
SecureWorks Threat Intelligence Executive Summary — June 2016 discusses the following events and trends that were significant in May 2016:
- Precautionary Password Resets - Breaches of several major websites and social media portals prompted many unaffected organizations to reset passwords or ban common passwords.
- Ubiquity Complicates Patching - Multiple flaws in widely used software, including some in active exploitation, resulted in hurried patches and organizations struggling to identify affected systems.
- Ransomware Shifts - TeslaCrypt ransomware developers ceased operations and voluntarily released its decryption keys, but threat actors migrated to CryptXXX (also known as UltraCrypter) and Cerber.
- Attackers Expand Operations - Anonymous factions conducted attacks against multiple verticals, and CTU™ researchers discovered that Threat Group-2633 (TG-2633) upgraded one of its key malicious tools.
- GDPR Enters Grace Period - Following the termination of the Safe Harbor agreement, the European Union (EU) ratified the General Data Protection Regulation (GDPR) and started its two-year grace period, encouraging organizations to examine their storage and sharing controls.
- U.S. House Suspends Access - The U.S. House of Representatives suspended access to Google and Yahoo services pending resolution of security concerns.