Threat Intelligence provides the power to protect your organisation against emerging threats.
SecureWorks® Counter Threat Unit™ (CTU) security intelligence research team delivers this power by offering learnings and observations of the cyber threat landscape in a monthly Threat Intelligence Executive Summary.
In this report you will learn the latest security trends from the previous month that were identified as significant by the CTU™ research team. The Executive Monthly report covers trends as they relate to vulnerabilities, malware, threat actors and methodologies, and law enforcement and government.
SecureWorks Threat Intelligence Executive Summary — November 2016 discusses the following events and trends that were significant in October 2016
- ZERO-DAY VULNERABILITIES EXPLOITED - Threat actors exploited Windows and Flash Player vulnerabilities prior to vendors issuing out-of-band updates.
- DEVICES CAUSED DATA LEAKS - Researchers discovered data leaks in sensitive networks from devices that were not originally intended to be connected to the Internet.
- RANSOMWARE CHANGED TACTICS - Ransomware experimented with delivery mechanisms and varied encrypted file formats and extensions.
- BANKING TROJAN REUSED CODE - Code from the defunct Dyre banking trojan was reused in the TrickBot banking malware.
- GOVERNMENT ORGANISATIONS TARGETED - Politically inspired threat actors targeted governmental departments and organisations.
- ATTACKS PROMPTED GOVERNMENT RESPONSE - The Mirai botnet DDoS attacks prompted legislators to propose solutions and implement rules.