Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    A Busy Week of Security Studies: Insider, DDoS, Mobile Threats

    Written by

    Sean Michael Kerner
    Published April 24, 2016
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      In any given week, multiple vendors issue reports and surveys on the status of the security industry and the threats that enterprises and consumers are facing. This past week was particularly busy for reports, with studies from IBM, Trustwave, Imperva, Vectra Networks, Tripwire, Beazley and Wandera, among others.

      Each report has its own focus, as each vendor has a particular domain of expertise, and in some cases, security studies have a self-serving purpose in order to validate that a given vendor’s technology solves a challenge outlined in a study. Security studies, like any other research, also vary in methodology as well as the quality and number of responses received.

      Looking at the multiple reports issued this past week provides an interesting, insightful look at a set of trends about where security stands today.

      Insiders, Partners Posing Risks

      IBM’s 2016 Cyber Security Intelligence Index highlights the challenge of insiders as a growing risk over the past year. According to IBM, 60 percent of attacks in 2015 involved insiders, up from 55 percent in 2014. IBM also found that the Shellshock vulnerability represented 38 percent of attacks that targeted financial institutions in 2015.

      While IBM highlights the security risks of insiders, Tripwire released a study on the impact of business partner security. Among the high-level findings in the study is that 34 percent of the surveyed organizations use partners and suppliers that fail to meet their security standards. That fact is somewhat surprising, given that 95 percent of respondents to Tripwire’s study reported that they believe a partner or security breach could expose valuable data.

      The Beazley Breach Insights 2016 report also examined the risks partners pose. According to Beazley, 18 percent of breaches it worked on in 2015 involved third-party vendors, up from only 6 percent in 2014. Among the big highlights of the Beazley Breach Insights, though, is the projection that Ransomware will grow by 250 percent in 2016 over 2015.

      DDoS Attacks, C&C Activity and More

      Among the various types of attacks that commonly occur on the modern Internet are of the distributed denial-of-service (DDoS) variety. That is the subject of the Imperva Q1 2016 Global DDoS Threat Landscape report. One of the key findings in the report is that DDoS attacks aren’t typically one-off exercises; rather, almost half (49.9 percent) of DDoS-targeted Websites were attacked more than once.

      Observing a different aspect of the security risk landscape, the 2016 Trustwave Global Security Report sheds some light on the specific vulnerabilities attackers used in 2015. According to Trustwave, Adobe Flash was a top target, with 38 percent of all zero-days in 2015 based in Flash. Looking at platforms, 71 percent of Web attacks observed by Trustwave, targeted open-source WordPress, while 85 percent of compromised e-commerce systems used the open-source Magento system. Not surprisingly, 60 percent of breaches targeted payment card data.

      While attackers use different methods to get into networks, Vectra Networks 2016 post-intrusion report provides some insights into what attackers are doing once they gain access. Command-and-control (C&C) activity from a botnet host was found in 67 percent of attacks.

      A Busy Week of Security Studies: Insider, DDoS, Mobile Threats

      The Vectra report noted that C&C activity is not a surprise after a breach, as that’s how botnet attacks are enabled. With a botnet in place, one of the leading monetization techniques used is click fraud, found in 58.1 percent of attacks Vectra analyzed. While click fraud is common, only 3.1 percent of cases Vectra analyzed found data exfilitration as part of a post-intrusion activity.

      Mobile Security

      Among the hottest areas of security today is mobile, which the Wandera Mobile Data Report Q1 2016 examines. Wandera reported a 17 percent rise in the first quarter of this year from last year’s fourth quarter in the number of analyzed apps and mobile Websites that are leaking sensitive data.

      So what do all the reports published just last week reveal about the security landscape? In summary, partners and insiders are a risk, mobile apps are leaking data, DDoS attacks are often repeated and Flash is a top path to exploitation.

      No big surprises and in many cases, the studies affirm what many IT professionals and security experts likely already suspected, but it’s still always good to get numerical and empirical confirmation.

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×