Emergency Incident ResponseReport a Confirmed or Potential Breach? Call +1 770-870-6343
0 Results Found
              Back To Results

                Threat Intelligence Executive Report 2017: Vol 1

                Review the events and trends from the information security world from November through December 2016

                Threat Intelligence provides the power to protect your organization against emerging threats.

                The SecureWorks® Counter Threat Unit™ (CTU) research team analyzes security threats and helps organizations protect their systems. During November and December 2016, CTU™ researchers identified lessons learned and observed notable developments in threat behaviors and the global threat landscape:

                • Weak and outdated software enabled breaches
                  • Threat actors exploited a weak multi-factor authentication implementation and bypassed outdated antivirus software to breach organizations.
                • Threat actors leveraged legitimate features
                  • To facilitate their activities in a compromised environment, threat actors used native system features rather than malware.
                • Threat groups targeted organizations for espionage
                  • Government-sponsored threat groups updated their tool-sets and conducted targeted espionage intrusions against networks in the technology, manufacturing, and defense verticals.
                • Shamoon wiper malware reemerged
                  • Destructive malware reemerged that destroyed tens of thousands of devices in 2012.


                Given these sophisticated attacks and increasingly adaptable threat actors, CTU researchers encourage organizations to consider the lessons learned from these incidents when designing their security protections. While implementing security best practices could limit the likelihood and impact of many intrusions, understanding and addressing threat behaviors can help organizations anticipate and disrupt potential breaches.

                Like what you're reading?
                Just a few questions to get started


                Select Role:

                • Board of Directors
                • CEO / CFO / COO
                • CISO / CSO
                • CIO / CTO
                • IT / IS / Security VP/Director
                • IT / IS / Security Manager
                • IT / IS / Security Staff
                • IT / IS / Non-Security
                • Risk / Legal / Compliance / Finance
                • Sales / Marketing
                • Press / Industry Analyst
                • Student

                Select Country:

                • Select an item

                Select State:

                • Select an item

                Select Annual Revenue:

                • ≥ $500M
                • $100-$499M
                • ≤ $100M

                Select Industry:

                • Banking
                • Business Services
                • Credit Union
                • Education
                • Finance
                • Government
                • Health Care (Non-Hospital)
                • Heavy Industry
                • Hospitality
                • Hospitals
                • Insurance
                • Legal
                • Manufacturing
                • Media
                • Membership Organizations
                • Retail
                • Technology
                • Telecom
                • Transportation
                • Utilities
                • Other

                Current Security Environment?:

                • Managing In-House
                • Managing Externally (3rd Party)
                • Blended Model (In-house and 3rd Party)
                • Not sure

                Select Next Security Initiative Timeframe:

                • 0-3 months
                • 3-6 months
                • 6-12 months
                • 12-24 months

                Select Our Greatest Security Challenge:

                • Securing the Cloud
                • Assessing security posture
                • Optimizing Security Operations
                • Protecting critical assets
                • Meeting & maintaining compliance
                • Preventing a data breach
                • Access to actionable security intelligence
                • Access to security expertise
                • Preparing & responding to an incident

                Interested in learning more

                Currently Looking for Assistance With (Select all that Apply)

                Select Best time to call:

                • Early morning (8-10am EST)
                • Late morning (10am-12pm EST)
                • Early afternoon (12-3pm EST)
                • Late afternoon (3-5pm EST)

                Secureworks News :

                Related Content