Thursday, April 18, 2024
No menu items!
Ad

Top 5 This Week

bama cap

Related Posts

Cisco Security Report Exposes Widening Gulf between Perception and Reality of Cyber Threats

cyber-security

The Cisco 2015 Annual Security Report has revealed that organizations must adopt an ‘all hands on deck’ approach to defend against cyber attacks.  Attackers have become more proficient at taking advantage of gaps in security to evade detection and conceal malicious activity.

Sabrina Dar, GM, Cisco East Africa said: “Attackers have become more proficient at taking advantage of security gaps.  At any given time, we should expect for one percent of high-urgency vulnerabilities to be actively exploited while 56 percent of all OpenSSL versions are still vulnerable to Heartbleed.  Despite this, we see less than half of the security teams surveyed using standard tools like patching and configuration management to help prevent security breaches.”

- Ad -

The report findings conclude that its time for corporate boards to take a role in setting security priorities and expectations.  Cisco’s “Security Manifesto”, a formal set of security principals as a foundation to achieving security, can help corporate boards, security teams and the users in the organization, to better understand and respond to the cybersecurity challenges of today’s world. The principals say that security MUST:

  1. Support the business.
  2. Work with existing architecture – and be usable.
  3. Transparent and informative.
  4. Enable visibility and appropriate action.
  5. Be viewed as a “people problem.”

Online criminals are expanding their tactics and morphing their messages to carry out cyber-attack campaigns and make it harder to detect them.  The top three trends that Cisco’s threat intelligence uncovered are:

- Ad-
  • Snowshoe spam: Emerging as a preferred strike method, attackers are sending low volumes of spam from a large set of IP addresses to avoid detection.
  • Web Exploits Hiding in Plain Site: Widely used exploit kits are getting dismantled by security companies in short order.  As a result online criminals are using other less common kits to successfully carry out their tactics – a sustainable business model as it does not attract too much attention.
  • Malicious Combinations: Flash and JavaScript have historically been insecure on their own, but with advances in security, attackers are combining the weakest of the two parts. Flash malware can now interact with JavaScript to hide malicious activity by sharing an exploit between two different files: one Flash, one JavaScript.  This type of blended attack is very hard to detect.
Caroline Vutagwa
Caroline Vutagwahttps://my.techmoran.com
Minding my own business is not enough for me that's why you will always find me minding Africa's Businesses as well as Technology and of course letting you know about it. Talk to me on [email protected]

Popular Articles