• Articles
    • Editorial Articles
    • Research Articles
    • WatchGuard Articles
  • The 443 Podcast
  • Threat Landscape
  • About
    • About Us
    • Contact Us
    • Contribute to Secplicity

Secplicity - Security Simplified

Powered by WatchGuard Technologies

The Top Cyber Threats Businesses Face Today

December 12, 2018 By The Editor

As 2018 comes to a close and we look ahead toward the new year, now is the time for reflection and planning. And for businesses of all sizes and industries, cyber security should be a major topic of discussion through this process. When it comes to information security, there isn’t a company out there that can afford not to ask the tough questions. When was the last time you reassessed your security strategy? Are you aware of the latest attack techniques? Is your organization equipped to protect employees that work remotely? The list goes on.

To help businesses better understand today’s threat landscape and how to prepare for it, WatchGuard’s CTO Corey Nachreiner has published a two-part series on Forbes that explores the top five cyber threats organizations face today. Here’s an excerpt from the piece that outlines the dangers of fileless malware and how to defend against it:

“For decades now, criminals have designed their malware to be persistent, or capable of lingering on your computer and even surviving a reboot. In order to retain this persistence, malware drops at least one file on your computer and changes things like your registry settings in order to restart upon reboot.

Recently, however, something called fileless malware has gained prevalence. Unlike traditional malware, this type of threat only loads itself in your computer’s volatile memory (RAM), sometimes piggy-backing on top of another existing and legitimate process running on your computer. Though files like malicious Word documents are sometimes leveraged to load this malware, these threats don’t need to use files at all. For instance, attackers can use software vulnerabilities to execute code directly on your computer and then leverage that access to load fileless malware.

So, what can you do about it? Consider endpoint detection and response (EDR) solutions or other anti-malware offerings that look beyond files and registry settings. It’s important that these solutions pay attention to the processes running on your computer and look for other memory injection techniques that cybercriminals might use to launch fileless threats.”

But that’s not the only threat that should be top of mind in 2019 and beyond. Corey also covers major attack methods like cryptojackers, ransomworms and more in this two-part series. Check out the complete list of the top five threats businesses face today on Forbes. And for a look ahead at what new security threats and trends we might see in the coming year, read about WatchGuard’s 2019 Security Predictions here.

Share This:

Related

Filed Under: Editorial Articles, Featured Tagged With: cyber security, exploit, Hacking, Malware, Phishing, ransomware, Security breach

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

The 443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers. Listen Now
the 443 podcast

Threat Landscape

Filter and view Firebox Feed data by type of attack, region, country, and date range. View Now
threat landscape

Top Posts

  • Cybersecurity News: Free Cybersecurity Training, TrickBot Group Exposed, Major GoDaddy Breach, and Russia to Legalize cybercrime?!
  • US National Cybersecurity Strategy
  • 3CX Supply Chain Attack
  • Here Come The Regulations

Email Newsletter

Sign up to get the latest security news and threat analysis delivered straight to your inbox

By signing up you agree to our Privacy Policy.


The views and opinions expressed on this website are those of the authors and do not necessarily reflect the policy or position of WatchGuard Technologies.

Stay in Touch

Recent Posts

  • 3CX Supply Chain Attack
  • The NSA’s Guidance on Securing Authentication
  • Cybersecurity News: LastPass Incident Revealed, White House Issues Cybersecurity Strategy, FBI Purchases Leaked USHOR PII Data, and a Slew of Other Breaches
  • An Update on Section 230
  • Here Come The Regulations
View All

Search

Archives

Copyright © 2023 WatchGuard Technologies · Cookie Policy · Privacy Policy · Terms of Use