November 2016 Threat Intelligence Executive Summary Report
Get Your Complimentary Paper
Review the events and trends from the information security world last month
What you will learn:
- ZERO-DAY VULNERABILITIES EXPLOITED - Threat actors exploited Windows and Flash Player vulnerabilities prior to vendors issuing out-of-band updates
- DEVICES CAUSED DATA LEAKS - Researchers discovered data leaks in sensitive networks from devices that were not originally intended to be connected to the Internet
- RANSOMWARE CHANGED TACTICS - Ransomware experimented with delivery mechanisms and varied encrypted file formats and extensions
- BANKING TROJAN REUSED CODE - Code from the defunct Dyre banking trojan was reused in the TrickBot banking malware
- GOVERNMENT ORGANIZATIONS TARGETED - Politically inspired threat actors targeted governmental departments and organizations
- ATTACKS PROMPTED GOVERNMENT RESPONSE - The Mirai botnet DDoS attacks prompted legislators to propose solutions and implement rules
Threat Intelligence provides the power to protect your organization against emerging cybersecurity threats.
Secureworks® Counter Threat Unit™ (CTU) security intelligence research team delivers this power by offering learnings and observations of the cyber threat landscape in a monthly Threat Intelligence Executive Summary.