Report![Threat Intelligence Executive Summary Report for November 2016](/-/jssmedia/images/insights/places/032-office-building-at-night/places_0032_office-building-at-night_1600x650.jpg?h=650&iar=0&w=1600&hash=58F8917EED97B5A4F9046E5EC0CCE35F&mw=3840)
November 2016 Threat Intelligence Executive Summary Report
![Threat Intelligence Executive Summary Report for November 2016](/-/jssmedia/images/insights/places/032-office-building-at-night/places_0032_office-building-at-night_1600x650.jpg?h=650&iar=0&w=1600&hash=58F8917EED97B5A4F9046E5EC0CCE35F&mw=3840)
Get Your Complimentary Paper
All fields are required.
Review the events and trends from the information security world last month
What you will learn:
- ZERO-DAY VULNERABILITIES EXPLOITED - Threat actors exploited Windows and Flash Player vulnerabilities prior to vendors issuing out-of-band updates
- DEVICES CAUSED DATA LEAKS - Researchers discovered data leaks in sensitive networks from devices that were not originally intended to be connected to the Internet
- RANSOMWARE CHANGED TACTICS - Ransomware experimented with delivery mechanisms and varied encrypted file formats and extensions
- BANKING TROJAN REUSED CODE - Code from the defunct Dyre banking trojan was reused in the TrickBot banking malware
- GOVERNMENT ORGANIZATIONS TARGETED - Politically inspired threat actors targeted governmental departments and organizations
- ATTACKS PROMPTED GOVERNMENT RESPONSE - The Mirai botnet DDoS attacks prompted legislators to propose solutions and implement rules
Threat Intelligence provides the power to protect your organization against emerging cybersecurity threats.
Secureworks® Counter Threat Unit™ (CTU) security intelligence research team delivers this power by offering learnings and observations of the cyber threat landscape in a monthly Threat Intelligence Executive Summary.