The Threat Landscape Jan 2013. 2013 Threat Report 2.

Slides:



Advertisements
Similar presentations
TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
Advertisements

Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Cyber Threats: Industry Trends and Actionable Advice Presented by: Elton Fontaine.
Cybercrime: From Kudos to Profit Gerhard Eschelbeck, CTO Sophos.
Security for Today’s Threat Landscape Kat Pelak 1.
Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
IBM Security Network Protection (XGS)
Access · convergence · management security · performance Margins in Mobility – Ian Kilpatrick, Wick Hill.
© Blue Coat Systems, Inc John Yun Director, Product Marketing.
Norman SecureSurf Protect your users when surfing the Internet.
Sophos Mobile Security
[Name / Title] [Date] Effective Threat Protection Strategies.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
Prepared By, Mahadir Ahmad. StopBadware makes the Web safer through the prevention, mitigation, and remediation of badware websites. partners include.
Palo Alto Networks Modern Malware Cory Grant Regional Sales Manager Palo Alto Networks.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
©2015 Check Point Software Technologies Ltd. 1 Rich Comber SME, Threat Prevention Check Point Software Technologies Moving to a Prevent Based Security.
Proof-Of-Concept: Signature Based Malware Detection for Websites and Domain Administrators - Anant Kochhar.
Maintaining a Secure Messaging Environment Across , IM, Web and Other Protocols Jim Jessup Regional Manager, Information Risk Management Specialist.
Pre-Release Information Aug 17, 2009 Trend Micro Web Gateway Security InterScan Web Security Virtual Appliance v5 Advanced Reporting and Management v1.
Fostering worldwide interoperabilityGeneva, July 2009 How to counter web-based attacks on the Internet in Korea Heung Youl YOUM Chairman of Korea.
10/14/2015 Introducing Worry-Free SecureSite. Copyright Trend Micro Inc. Agenda Problem –SQL injection –XSS Solution Market opportunity Target.
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
Interception and Analysis Framework for Win32 Scripts (not for public release) Tim Hollebeek, Ph.D.
Sophos Live Protection. Agenda 1.Before and After Scenarios 2.Minimum Required Capabilities 3.How we do it 4.How we do it better.
1 FACEBOOK: CAPITALIZING ON AN ECOSYSTEM Joseph Kusnick & Jeunetta Lewis.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
Module 7: Advanced Application and Web Filtering.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
Computer Security By Duncan Hall.
January 07 th 2016 Intelligence Briefing NOT PROTECTIVELY MARKED.
©2015 HEAT Software. All rights reserved. Proprietary & Confidential. Ransomware: How to Avoid Extortion Matthew Walker – VP Northern Europe.
WebWatcher A Lightweight Tool for Analyzing Web Server Logs Hervé DEBAR IBM Zurich Research Laboratory Global Security Analysis Laboratory
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
Global Mobile Anti-malware Market WEBSITE Single User License: US$ 2500 No of Pages: 55 Corporate User License: US$
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
Kaspersky Small Office Security INTRODUCING New for 2014!
1Copyright © 2015 Blue Coat Systems Inc. All Rights Reserved. BLUE COAT SYSTEMS CORPORATE OVERVIEW May 2015.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Palindrome Technologies all rights reserved © 2016 – PG: Palindrome Technologies all rights reserved © 2016 – PG: 1 Peter Thermos President & CTO Tel:
Powerpoint presentation on Drive-by download attack -By Yogita Goyal.
1 Sophos Security made simple. Steven Hecht Channel Account Executive Andy Miller Enterprise Account Manager
R ANSOMWARE CAN ORIGINATE FROM A MALICIOUS WEBSITE THAT EXPLOITS A KNOWN VULNERABILITY, PHISHING CAMPAIGNS,
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
This Is Next-Gen Web Security. Agenda 2 Web Security Today Defining Next-Gen Web Security Introducing Sophos Secure Web Gateway o Web Security o Web Simplicity.
2017 Security Predictions from FortiGuard Labs
Sophos Central for partners and customers: overview and new features
BUILD SECURE PRODUCTS AND SERVICES
A Virtual Tour of SophosLabs Building next-generation protection
Trends in Ransomware Distribution
AKAMAI INTELLIGENT PLATFORM™
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
Secure once, run anywhere Simplify your security with Sophos
WannaCry Ransomware Overview
Information Security – Sep 18
Information Protection
Introduction to Symantec Security Service
Threat Landscape Update
Information Protection
Presentation transcript:

The Threat Landscape Jan 2013

2013 Threat Report 2

What you can do with the Threat Report 3 Educate buyers how threats lead to both paths of Complete Security Create opportunities vs. Find opportunities Help your partners become security experts Learn 2-3 case studies and facts/stats from Threat Report

1. Threat Volume SophosLabs see 250,000 new files each day 4 250,000 previously unseen files received each day within SophosLabs

2. The malicious web Web servers are under constant attack. A new malicious URL every couple of seconds 20-30k malicious URLs seen each day. This is almost a new malicious URL every 2 secs

3. Professionalism, crimeware ‘Monetization’ : the bulk of today’s threats are automated, coordinated & professional 6

Case study 1: Drive-by downloads 7

Controlling user traffic Inject redirects into legitimate sites Web threats are all about controlling user web traffic 80% of malicious URLs are actually legitimate sites that have been compromised

It’s all about traffic Distribution of today’s web threats (2012 H1)

Drive-by downloads Compromising legitimate websites to drive user traffic to malware

Drive-by downloads Compromising legitimate websites to drive user traffic to malware

Drive-by downloads Compromising legitimate websites to drive user traffic to malware

Drive-by downloads Compromising legitimate websites to drive user traffic to malware URL filtering Content detection

Case study 2: Ransomware 14

Ransomware Multi-lingual! 15

Ransomware Malware that locks/encrypts user data Pay ransom to access files 16 Simple Password protected archives Medium XOR shift Complex RC4 Public key crypto Recover data?

Blackhole payloads Payload distribution (late 2012) 17

Case study 3: Android Threats 18

Mobile OS market (US) What will mobile malware target? 19

Android Applications Significant growth Apps available Customer downloads

Android malware Huge growth in 2012 (x40, just in September!) Android samples analyzed each day within SophosLabs

Android vs PC 22

SophosLabs 23

SophosLabs Key differentiators 24 1.Integrated threat analysis 2.Fast response time 3.Global presence 24/7/365 4.Updates issued from any lab location at any time 5.100% in-house technology 6.Pre-configured intelligence

Top Facts 25 1,000 Android samples analysed each day within SophosLabs 80% of malicious URLs are actually legitimate sites that have been compromised 250,000 previously unseen files received each day within SophosLabs 20-30k malicious URLs seen each day. This is almost a new malicious URL every 2 secs

Top Facts 26

Mitigating Risks 27 Complete Security Solutions designed to mitigate risks

Questions? 28