Intelligent CIO Europe Issue 10 | Page 33

INFOGRAPHIC from the Bankbot family introduced several innovations . It is capable of performing ransomware , keylogger , RAT functions , SMS interception , lock screen and call forwarding . Keeping tabs of morphing attacks with actionable threat intelligence is vital as creativity expands .
Malware developers leverage agile development
Malware authors have long relied on polymorphism to evade detection . Recent attack trends show they are turning to agile development practices to make their malware even more difficult to detect and to counter the latest tactics of anti-malware products . GandCrab had many new releases this year and its developers continue to update this malware at a rapid pace .
While automation of malware attacks presents new challenges , so does agile development because of the skills and processes to rollout new evading releases of attack methods . To keep pace with the agile development cybercriminals are employing , organisations need advanced threat protection and detection capabilities that help them pinpoint these recycled vulnerabilities .
Effective targeting of vulnerabilities is a greater need for a wider diversity of applications . These organisations will require a security approach that breaks down silos between each of these apps , including their multi-cloud environments , for transparent visibility and security controls .
Combating evolving attacks requires integrated security powered by threat intelligence
The threat data in this quarter ’ s report once again reinforces many of the prediction trends unveiled by the FortiGuard Labs global research team for 2018 . A security fabric that is integrated across the attack surface and between each security element is vital . This approach enables actionable threat intelligence to be shared at speed and scale , shrinks the necessary windows of detection and provides the automated remediation required for the multi-vector exploits of today . •
Phil Quade , Chief Information Security Officer , Fortinet
Adversaries are selective in determining what vulnerabilities they target . With exploits examined from the lens of prevalence and volume of related exploit detections , only 5.7 % of known vulnerabilities were exploited in the wild . If the vast majority of vulnerabilities won ’ t be exploited , organisations should consider taking a much more proactive and strategic approach to vulnerability remediation .
Education and government application usage
When comparing application count usage across industries , government use of SaaS applications is 108 % higher than the mean and is second to education in the total number of applications used daily , 22.5 % and 69 % higher than the mean , respectively . The likely cause for the higher usage in these two industry segments
www . intelligentcio . com INTELLIGENTCIO
33