Emergency Incident ResponseReport a Confirmed or Potential Breach? Call   +1 770-870-6343
0 Results Found
              Back To Results

                Threat Intelligence Executive Report 2017: Vol 2

                Review the global threat events and adversary trends over the last two months as analysed by our CTU researchers

                Threat Intelligence provides the power to protect your organisation against emerging threats.

                The Secureworks® Counter Threat Unit™ (CTU) rresearch team analyses security threats and helps organisations protect their systems. During January and February 2017, CTU researchers identified lessons learned and observed notable developments in threat behaviours, the global threat landscape, and information security trends.

                In this edition you will learn about:

                • The NICKEL GLADSTONE threat group continued its trend of targeting financial networks for monetary gain.
                • The Iranian COBALT GYPSY threat group used shortened phishing links and Microsoft Word macros to target Middle Eastern organisations in multiple verticals.
                • The presence of three active threat groups on a single supplier’s network demonstrated third-party risks.
                • Limiting availability of native operating system administrative tools mitigates threat actors’ capabilities.

                As sophisticated attacks increase and threat actors demonstrate greater adaptability, CTU researchers encourage organisations to consider the information in this report when planning and prioritising cybersecurity strategies and operations. Implementing security best practices could limit the likelihood and impact of many intrusions, and understanding and addressing threat behaviours could help organisations anticipate and disrupt breaches and security incidents.

                Like what you're reading ?
                Get instant access by completing the form below


                Select Role:

                • Board of Directors
                • CEO / CFO / COO
                • CISO / CSO
                • CIO / CTO
                • IT / IS / Security VP/Director
                • IT / IS / Security Manager
                • IT / IS / Security Staff
                • IT / IS / Non-Security
                • Risk / Legal / Compliance / Finance
                • Sales / Marketing
                • Press / Industry Analyst
                • Student

                Select Country:

                • Select an item

                Select State:

                • Select an item

                Select Annual Revenue:

                • > 1000
                • 501 - 999
                • < 500

                Select Industry:

                • Banking
                • Business Services
                • Credit Union
                • Education
                • Finance
                • Government
                • Health Care (Non-Hospital)
                • Heavy Industry
                • Hospitality
                • Hospitals
                • Insurance
                • Legal
                • Manufacturing
                • Media
                • Membership Organizations
                • Retail
                • Technology
                • Telecom
                • Transportation
                • Utilities
                • Other

                Current Security Environment?:

                • Managing In-House
                • Managing Externally (3rd Party)
                • Blended Model (In-house and 3rd Party)
                • Not sure

                Select Next Security Initiative Timeframe:

                • 0-3 months
                • 3-6 months
                • 6-12 months
                • 12-24 months

                Select Our Greatest Security Challenge:

                • Securing The Cloud
                • Assessing security posture
                • Optimizing Security Operations
                • Protecting critical assets
                • Meeting & maintaining compliance
                • Preventing a data breach
                • Access to actionable security intelligence
                • Access to security expertise
                • Preparing & responding to an incident

                Interested in learning more

                Currently Looking for Assistance With (Select all that Apply)

                Select Best time to call:

                • Early morning (8-10am)
                • Late morning (10am-12pm)
                • Early afternoon (12-3pm)
                • Late afternoon (3-5pm)

                Secureworks News :

                Related Content