LATEST INTELLIGENCE
MALWARE REVIEW: A LOOK BACK
AND A LOOK FORWARD
PRESENTED BY
T
Download whitepaper here
hroughout 2017, major cyber events that
resulted in severe financial and business-
critical data loss dominated the global media.
From cyber-enabled banking heists to WannaCry,
NotPetya, and a second serving of Shamoon, the
critical threats posed to our information security were
glaringly apparent.
While these major events took the spotlight, less
visible evolutions in the threat landscape continued.
Phishers demonstrated how quickly they could exploit
recently disclosed vulnerabilities, change how they
use or modify flexible malware and how swiftly they
could profit from new attack surfaces.
22
INTELLIGENTCIO
With the rise in and proliferation of cryptocurrencies,
the increase in enterprise use of cloud platforms
and leaks of sophisticated and highly effective
exploitation methods, attackers have more gates
through which they can access sensitive enterprise,
personal information and finances.
Furthermore, public disclosures of sophisticated
capabilities help less-sophisticated actors close
the gap as they are handed improved tactics,
techniques and procedures (TTPs). This report
details the emerging trends that defined 2017
and profiles areas of priority for network defenders
in 2018. n
www.intelligentcio.com