- The 40+ best Black Friday PlayStation 5 deals 2024: Deals available now
- The 25+ best Black Friday Nintendo Switch deals 2024
- Why there could be a new AI chatbot champ by the time you read this
- The 70+ best Black Friday TV deals 2024: Save up to $2,000
- This AI image generator that went viral for its realistic images gets a major upgrade
VMware Enables Greater Security and Business Resilience for the Modern, Distributed Enterprise
At RSA Conference 2021, VMware will showcase how the company helps eliminate the complexity existing approaches with more interconnected security New threat landscape report details how attackers are successfully evading perimeter defenses PALO ALTO, Calif.–(BUSINESS WIRE)– At RSA Conference 2021, VMware security experts will highlight opportunities for continued evolution in cybersecurity …
Mon, 17 May 2021 00:00:00
At
New threat landscape report details how attackers are successfully evading perimeter defenses
At
Cybersecurity has long been a domain of innovation but is reaching a point of diminishing returns. According to Gartner, end-user spending for the information security and risk management market is estimated to grow at a compound annual growth rate of 8.7% from 2020 through 2025 to reach
New Threat Landscape Report Highlights Extent of Threats Evading Perimeter Defenses
Highlighting the need for a new approach, particularly inside the perimeter, is a newly released threat landscape report from the VMware Threat Analysis Unit(3). In “North-by-South-West: See What Evaded Perimeter Defenses,” the findings are clear: despite a cadre of perimeter defenses being deployed, malicious actors are actively operating in the network. The research presents a clear picture of how attackers evade perimeter detection, infect systems, and then attempt to spread laterally across the network to execute their objective. Key insights include:
The best offense is to evade defense: Evasion of defense systems is the most encountered MITRE ATT&CK tactic used by malware, followed by execution and discovery. More than half of the network anomalies detected are unusual beaconing, followed by connections on suspicious ports and anomalous connections between two hosts.
When it’s commonly used, it’s commonly abused: Email continues to be observed as the most common attack vector to gain initial access with more than four percent of all business emails analyzed containing a malicious component. Attackers appear to be massively scaling up operations via an email campaigns weaponizing ZIP file attachments with malicious content. More than half of all malicious artifacts analyzed were delivered by a Zip archive. Finally, more than 75 percent of lateral movement events identified were conducted using Remote Desktop Protocol (RDP) often using stolen credentials to log in to other hosts on the network.
In with the new (no but out with the old): The most common bad security practice being observed is the transmission of clear-text passwords over the network, which can provide attackers the keys to the kingdom, enabling them to move laterally and exfiltrate data. Additionally, events associated with crypto mining activity account for a quarter of all known threats observed, signaling a new threat vector that is emerging.
Download the full report here.
VMWARE SESSIONS AT RSA CONFERENCE 2021
Keynote – Telling Hard Truths to Impact Change in Cybersecurity
Enemy Inside the Gates: Securing the New Battleground
SASE: Separating Fact from Fiction (BOF Roundtable)
Escalation from Heist to Hostage Modern Bank Heists 4.0
Creating a Culture of Resiliency (BOF Roundtable)
Attend the VMware On-Demand Briefings below
-
Operationalizing Zero Trust withVMware (SB-3144) -
Zero Trust toFull Trust – Security for the Distributed Workforce (SB-3151) - Improving Public Cloud Security & Compliance Posture (SB-3249)
- Shift Security Left and Accelerate Application Deployments (SB-3206)
- Data Center Security Survival Guide (SB-3145)
- How to Protect Your Remote Workforce from Ransomware Attacks (SB-3146)
1-Gartner “Forecast: Information Security and Risk Management, Worldwide, 2019-2025, 1Q21 Update,”
2-CyberSecurity Ventures Special Report: Cyberwarfare in the C-Suite,
3-The report compiled by the VMware Threat Analysis Unit summarizes key data and findings observing millions of networks / network segments from
About
View source version on businesswire.com: https://www.businesswire.com/news/home/20210517005299/en/
+1 (408) 348-1569
rfortier@vmware.com
+1 (470) 247-1987
ktuttle@vmware.com
Source: