The Latest in IT Security

Forget about the malware, go after the attacker’s tactics, techniques and procedures

22
Jun
2017
Forget about the malware, go after the attacker’s tactics, techniques and procedures

hacker-ninja-e1459750750437

The cybercriminal’s options for monetizing attacks has never been broader, less complex, or less risky, and attempts to detect intrusions by detecting the malware they use has never been more pointless, a study commissioned by Arbor Networks has revealed.

“Nearly everything used by the attacker is now disposable, making most threat data and traditional anti-virus techniques almost useless. Industry sources have found that the vast majority of malware (over 95%) is automatically generated to produce unique binaries that are only used once and then discarded. Attack infrastructure, such as domains, IP addresses and servers are also largely disposable to attackers,” the polled white-hats noted.

Read More

Leave a reply


Categories

TUESDAY, JULY 25, 2017

Featured

Archives

Latest Comments

Social Networks