SlideShare una empresa de Scribd logo
1 de 14
Descargar para leer sin conexión
Cybersecurity
Threats You Should
Know About in 2018
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
Every year, Microsoft collects security and threat intelligence
from their global network and compiles the trends into the
Microsoft Security Intelligence Report.
To keep up with the always evolving landscape, the
Security Intelligence Report provides a thorough analysis of
security threats and how to best mitigate the top attack types.
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
This year’s report investigates three main topics
Botnets
Easy Mark Attack Methods
Ransomware
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
Botnets
Bots are programs that allow attackers
to infect and take control of computers,
and botnets are a network of those bots
controlled by command-and-control
(C&C) servers.
On November 29, 2017, Microsoft’s
Digital Crimes Unit tackled a leading
botnet that infected more than 23 million
IP addresses: Gamarue.
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
Botnets
Microsoft analyzed over 44,000 malware samples that revealed
Gamarue’s sprawling infrastructure.
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
Botnets
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
Easy Mark Attack Methods
With advancing security
solutions, hackers are more
apt to go after easy targets
through social engineering
and are constantly evolving
their tactics for maximum
efficiency.
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
Easy Mark Attack Methods
Here is one example of low-hanging fruit.
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
Easy Mark Attack Methods
Here is another example of low-hanging fruit.
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
Ransomware
Ransomware infects and
encrypts files (and sometimes
entire disks) to prevent
access until a ransom is paid
– and there’s no guarantee
victims will regain access.
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
Ransomware
Ransomware made a real-world impact in 2017, bringing down critical
services like hospitals, transportation, and traffic systems. Here are
few of the unprecedented and devastating ransomware families
responsible for the 2017 attacks:
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
Ransomware
SECURIT Y INT ELLIGENCE REPORT , VOLUME 23
Learn About Recent Cyberthreats
Download the full Microsoft Security Intelligence Report,
Volume 23 for more security insights.
www.microsoft.com/sir
© 2018 Microsoft Corporation. All rights reserved. This document is
for informational purposes only.
Microsoft makes no warranties, express or implied, with respect to
the information presented here.

Más contenido relacionado

La actualidad más candente

Home cyber security
Home cyber securityHome cyber security
Home cyber securityMichael File
 
Cyber Security Research Project Topics
Cyber Security Research Project TopicsCyber Security Research Project Topics
Cyber Security Research Project TopicsMatlab Simulation
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityHome
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident ResponsePECB
 
Prince banton cybercrime presentation
Prince banton cybercrime presentationPrince banton cybercrime presentation
Prince banton cybercrime presentationPrinceBanton1
 
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Damir Delija
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Netpluz Asia Pte Ltd
 
Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCBIZ, Inc.
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 ChallengesLeandro Bennaton
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptxPranavRaj96
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web ThreatsKim Jensen
 
NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...
NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...
NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...North Texas Chapter of the ISSA
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTAimee Shuck
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahadaliuet
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and securityDEEKSHAASHOKA
 

La actualidad más candente (20)

Cyber attacks in 2021
Cyber attacks in 2021Cyber attacks in 2021
Cyber attacks in 2021
 
Home cyber security
Home cyber securityHome cyber security
Home cyber security
 
Cyber Security Research Project Topics
Cyber Security Research Project TopicsCyber Security Research Project Topics
Cyber Security Research Project Topics
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security.pptx
Cyber security.pptxCyber security.pptx
Cyber security.pptx
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
 
Prince banton cybercrime presentation
Prince banton cybercrime presentationPrince banton cybercrime presentation
Prince banton cybercrime presentation
 
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
 
Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measures
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptx
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web Threats
 
NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...
NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...
NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahad
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 

Similar a Cybersecurity threats you should know about in 2018

Microsoft Digital Defense Report 2022.pdf
Microsoft Digital Defense Report 2022.pdfMicrosoft Digital Defense Report 2022.pdf
Microsoft Digital Defense Report 2022.pdfNirenj George
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019Omar Bshara
 
2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling final2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling finalMARIUS EUGEN OPRAN
 
Ce hv8 module 13 hacking web applications
Ce hv8 module 13 hacking web applications Ce hv8 module 13 hacking web applications
Ce hv8 module 13 hacking web applications Mehrdad Jingoism
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security reportMarco Antonio Agnese
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...Cyber Security Alliance
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisIRJET Journal
 
Microsoft Digital Defense Executive Summary-2022
Microsoft Digital Defense Executive Summary-2022Microsoft Digital Defense Executive Summary-2022
Microsoft Digital Defense Executive Summary-2022Kevin Fream
 
The IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence IndexThe IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence IndexKanishka Ramyar
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec Technology and Consulting
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec Technology and Consulting
 
2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat Report2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat ReportRapidSSLOnline.com
 
HCA 530, Week 2, Symantec 2016 threat report
HCA 530, Week 2, Symantec 2016 threat reportHCA 530, Week 2, Symantec 2016 threat report
HCA 530, Week 2, Symantec 2016 threat reportMatthew J McMahon
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityIRJET Journal
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Conkarenahmanny4c
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxcroysierkathey
 

Similar a Cybersecurity threats you should know about in 2018 (20)

Microsoft Digital Defense Report 2022.pdf
Microsoft Digital Defense Report 2022.pdfMicrosoft Digital Defense Report 2022.pdf
Microsoft Digital Defense Report 2022.pdf
 
Sel03129 usen
Sel03129 usenSel03129 usen
Sel03129 usen
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019
 
2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling final2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling final
 
original.pdf
original.pdforiginal.pdf
original.pdf
 
Ce hv8 module 13 hacking web applications
Ce hv8 module 13 hacking web applications Ce hv8 module 13 hacking web applications
Ce hv8 module 13 hacking web applications
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security report
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
Microsoft Digital Defense Executive Summary-2022
Microsoft Digital Defense Executive Summary-2022Microsoft Digital Defense Executive Summary-2022
Microsoft Digital Defense Executive Summary-2022
 
The IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence IndexThe IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence Index
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat Report2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat Report
 
HCA 530, Week 2, Symantec 2016 threat report
HCA 530, Week 2, Symantec 2016 threat reportHCA 530, Week 2, Symantec 2016 threat report
HCA 530, Week 2, Symantec 2016 threat report
 
Istr 21-2016-en
Istr 21-2016-enIstr 21-2016-en
Istr 21-2016-en
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
 
ISTR 23: Internet Security Threat Report
ISTR 23: Internet Security Threat Report ISTR 23: Internet Security Threat Report
ISTR 23: Internet Security Threat Report
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
 

Más de Microsoft

Modern Finance at Microsoft US
Modern Finance at Microsoft USModern Finance at Microsoft US
Modern Finance at Microsoft USMicrosoft
 
Modern Marketing: The Case of Microsoft US
Modern Marketing: The Case of Microsoft USModern Marketing: The Case of Microsoft US
Modern Marketing: The Case of Microsoft USMicrosoft
 
Norwegian Refugee Council
Norwegian Refugee CouncilNorwegian Refugee Council
Norwegian Refugee CouncilMicrosoft
 
Millennials and the Next Generation of IT
Millennials and the Next Generation of ITMillennials and the Next Generation of IT
Millennials and the Next Generation of ITMicrosoft
 
7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene  7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene Microsoft
 
Microsoft to Acquire LinkedIn: Overview for Investors
Microsoft to Acquire LinkedIn: Overview for InvestorsMicrosoft to Acquire LinkedIn: Overview for Investors
Microsoft to Acquire LinkedIn: Overview for InvestorsMicrosoft
 
Reimagining Business Operations
Reimagining Business OperationsReimagining Business Operations
Reimagining Business OperationsMicrosoft
 
Bring Your Own Device
Bring Your Own DeviceBring Your Own Device
Bring Your Own DeviceMicrosoft
 
Office365 Security Task Force
Office365 Security Task ForceOffice365 Security Task Force
Office365 Security Task ForceMicrosoft
 
5 Ways Affordable Innovation Can Revolutionize your Business
5 Ways Affordable Innovation Can Revolutionize your Business5 Ways Affordable Innovation Can Revolutionize your Business
5 Ways Affordable Innovation Can Revolutionize your BusinessMicrosoft
 
Top 5 Note Taking Tips from Future Innovators
Top 5 Note Taking Tips from Future InnovatorsTop 5 Note Taking Tips from Future Innovators
Top 5 Note Taking Tips from Future InnovatorsMicrosoft
 
Empowering Employee Engagement: Creating an Engaged Workforce through Afforda...
Empowering Employee Engagement: Creating an Engaged Workforce through Afforda...Empowering Employee Engagement: Creating an Engaged Workforce through Afforda...
Empowering Employee Engagement: Creating an Engaged Workforce through Afforda...Microsoft
 
Media in Transformation: A Technology Perspective
Media in Transformation: A Technology PerspectiveMedia in Transformation: A Technology Perspective
Media in Transformation: A Technology PerspectiveMicrosoft
 
Total Economic Impact of Microsoft Office 365 Forrester Study
Total Economic Impact of Microsoft Office 365 Forrester StudyTotal Economic Impact of Microsoft Office 365 Forrester Study
Total Economic Impact of Microsoft Office 365 Forrester StudyMicrosoft
 
Integrated Customer Service Maximization Experience Vision Demonstrator
Integrated Customer Service Maximization Experience Vision DemonstratorIntegrated Customer Service Maximization Experience Vision Demonstrator
Integrated Customer Service Maximization Experience Vision DemonstratorMicrosoft
 
Ignite Theater: Microsoft Enterprise Services Connected Collaboration Approach
Ignite Theater: Microsoft Enterprise Services Connected Collaboration ApproachIgnite Theater: Microsoft Enterprise Services Connected Collaboration Approach
Ignite Theater: Microsoft Enterprise Services Connected Collaboration ApproachMicrosoft
 
The Digital Airline
The Digital AirlineThe Digital Airline
The Digital AirlineMicrosoft
 
Driving results through a connected omni-channel retail sales experience
Driving results through a connected omni-channel retail sales experienceDriving results through a connected omni-channel retail sales experience
Driving results through a connected omni-channel retail sales experienceMicrosoft
 
Making Your Marketing More Effective
Making Your Marketing More Effective Making Your Marketing More Effective
Making Your Marketing More Effective Microsoft
 
Office Ergonomics: Dos and Don'ts
Office Ergonomics: Dos and Don'tsOffice Ergonomics: Dos and Don'ts
Office Ergonomics: Dos and Don'tsMicrosoft
 

Más de Microsoft (20)

Modern Finance at Microsoft US
Modern Finance at Microsoft USModern Finance at Microsoft US
Modern Finance at Microsoft US
 
Modern Marketing: The Case of Microsoft US
Modern Marketing: The Case of Microsoft USModern Marketing: The Case of Microsoft US
Modern Marketing: The Case of Microsoft US
 
Norwegian Refugee Council
Norwegian Refugee CouncilNorwegian Refugee Council
Norwegian Refugee Council
 
Millennials and the Next Generation of IT
Millennials and the Next Generation of ITMillennials and the Next Generation of IT
Millennials and the Next Generation of IT
 
7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene  7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene
 
Microsoft to Acquire LinkedIn: Overview for Investors
Microsoft to Acquire LinkedIn: Overview for InvestorsMicrosoft to Acquire LinkedIn: Overview for Investors
Microsoft to Acquire LinkedIn: Overview for Investors
 
Reimagining Business Operations
Reimagining Business OperationsReimagining Business Operations
Reimagining Business Operations
 
Bring Your Own Device
Bring Your Own DeviceBring Your Own Device
Bring Your Own Device
 
Office365 Security Task Force
Office365 Security Task ForceOffice365 Security Task Force
Office365 Security Task Force
 
5 Ways Affordable Innovation Can Revolutionize your Business
5 Ways Affordable Innovation Can Revolutionize your Business5 Ways Affordable Innovation Can Revolutionize your Business
5 Ways Affordable Innovation Can Revolutionize your Business
 
Top 5 Note Taking Tips from Future Innovators
Top 5 Note Taking Tips from Future InnovatorsTop 5 Note Taking Tips from Future Innovators
Top 5 Note Taking Tips from Future Innovators
 
Empowering Employee Engagement: Creating an Engaged Workforce through Afforda...
Empowering Employee Engagement: Creating an Engaged Workforce through Afforda...Empowering Employee Engagement: Creating an Engaged Workforce through Afforda...
Empowering Employee Engagement: Creating an Engaged Workforce through Afforda...
 
Media in Transformation: A Technology Perspective
Media in Transformation: A Technology PerspectiveMedia in Transformation: A Technology Perspective
Media in Transformation: A Technology Perspective
 
Total Economic Impact of Microsoft Office 365 Forrester Study
Total Economic Impact of Microsoft Office 365 Forrester StudyTotal Economic Impact of Microsoft Office 365 Forrester Study
Total Economic Impact of Microsoft Office 365 Forrester Study
 
Integrated Customer Service Maximization Experience Vision Demonstrator
Integrated Customer Service Maximization Experience Vision DemonstratorIntegrated Customer Service Maximization Experience Vision Demonstrator
Integrated Customer Service Maximization Experience Vision Demonstrator
 
Ignite Theater: Microsoft Enterprise Services Connected Collaboration Approach
Ignite Theater: Microsoft Enterprise Services Connected Collaboration ApproachIgnite Theater: Microsoft Enterprise Services Connected Collaboration Approach
Ignite Theater: Microsoft Enterprise Services Connected Collaboration Approach
 
The Digital Airline
The Digital AirlineThe Digital Airline
The Digital Airline
 
Driving results through a connected omni-channel retail sales experience
Driving results through a connected omni-channel retail sales experienceDriving results through a connected omni-channel retail sales experience
Driving results through a connected omni-channel retail sales experience
 
Making Your Marketing More Effective
Making Your Marketing More Effective Making Your Marketing More Effective
Making Your Marketing More Effective
 
Office Ergonomics: Dos and Don'ts
Office Ergonomics: Dos and Don'tsOffice Ergonomics: Dos and Don'ts
Office Ergonomics: Dos and Don'ts
 

Último

QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 

Último (20)

QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 

Cybersecurity threats you should know about in 2018

  • 2. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 Every year, Microsoft collects security and threat intelligence from their global network and compiles the trends into the Microsoft Security Intelligence Report. To keep up with the always evolving landscape, the Security Intelligence Report provides a thorough analysis of security threats and how to best mitigate the top attack types.
  • 3. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 This year’s report investigates three main topics Botnets Easy Mark Attack Methods Ransomware
  • 4. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 Botnets Bots are programs that allow attackers to infect and take control of computers, and botnets are a network of those bots controlled by command-and-control (C&C) servers. On November 29, 2017, Microsoft’s Digital Crimes Unit tackled a leading botnet that infected more than 23 million IP addresses: Gamarue.
  • 5. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 Botnets Microsoft analyzed over 44,000 malware samples that revealed Gamarue’s sprawling infrastructure.
  • 6. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 Botnets
  • 7. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 Easy Mark Attack Methods With advancing security solutions, hackers are more apt to go after easy targets through social engineering and are constantly evolving their tactics for maximum efficiency.
  • 8. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 Easy Mark Attack Methods Here is one example of low-hanging fruit.
  • 9. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 Easy Mark Attack Methods Here is another example of low-hanging fruit.
  • 10. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 Ransomware Ransomware infects and encrypts files (and sometimes entire disks) to prevent access until a ransom is paid – and there’s no guarantee victims will regain access.
  • 11. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 Ransomware Ransomware made a real-world impact in 2017, bringing down critical services like hospitals, transportation, and traffic systems. Here are few of the unprecedented and devastating ransomware families responsible for the 2017 attacks:
  • 12. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 Ransomware
  • 13. SECURIT Y INT ELLIGENCE REPORT , VOLUME 23 Learn About Recent Cyberthreats Download the full Microsoft Security Intelligence Report, Volume 23 for more security insights. www.microsoft.com/sir
  • 14. © 2018 Microsoft Corporation. All rights reserved. This document is for informational purposes only. Microsoft makes no warranties, express or implied, with respect to the information presented here.

Notas del editor

  1. Please update icons with those found in the source file
  2. Please update image with the asset in the source file
  3. Please update image with the asset in the source file
  4. Please update image with the asset in the source file
  5. Please update image with the asset in the source file
  6. Please update image with the asset in the source file
  7. Please update image with the asset in the source file
  8. Please update image with the asset in the source file
  9. Please update image with the asset in the source file
  10. Please update image with the asset in the source file