+ All Categories
Home > Technology > Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook

Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook

Date post: 17-Jul-2015
Category:
Upload: cyren
View: 130 times
Download: 3 times
Share this document with a friend
Popular Tags:
21
1 ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission. CYREN Security Yearbook 2015 Lior Kohavi, Avi Turiel
Transcript

1©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission.

CYREN Security Yearbook 2015

Lior Kohavi, Avi Turiel

2©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

2014 – Looking Back

Protecting the Enterprise

• Mapping the Attack

• Predicting Malware in Advance

The return of the Macro-Virus

Phishing – Gateway to the Breach

Malware on the Move

Rapid Spam Attacks

Assessing Industrial IoT Threats in 2015 and Beyond

Agenda

3©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 3©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

About CYREN

THE BEST KEPT SECRET IN INFORMATION SECURITY FOR MORE THAN A DECADE

Founded in 1991, CYREN (NASDAQ and TASE: CYRN) is a long-time innovator in cybersecurity. With full-function Security as a Service (SecaaS) solutions and security technology components for embedded deployments, CYREN provides web, email, endpoint and mobile security solutions that the world’s largest IT companies trust for protection against today’s advanced threats. CYREN collects threat data and delivers cyber intelligence through a unique global network of over 500,000 points of presence that processes 17 billion daily transactions and protects 600 million users.

3©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

4©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

CYREN Powers the World’s Security

Our Cyber Intelligence is the security backbone of many of the world’s largest and most influential information technology and Internet security brands.

5©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

CYREN Cybersecurity by the Numbers

6©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Poll Question

7©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Breaches such as Home Depot made the news… but..

Enterprises are besieged by cybercrime at an alarming rate: During the four-year period 2010-2014, the:

• Number of successful cyberattacks on businesses of all sizes increased by 144%

• Cost of cybercrime per company increased by 95%

• Average time to resolve incidents increased by 221%

Business leaders must think about solutions that utilize cyber intelligence from industry experts

2014 – Looking Back

Cybercriminals can sell personally

identifiable information (PII), such as the type recently stolen from Blue Cross

Blue Shield Anthem, for 10

times more than credit card data

on the black market.

8©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

In this section, we use in-depth analysis of individual threats captured by CYREN in 2014, to illustrate:

• How cybercriminals engage in the business of crime

• How they target the enterprise

• What CYREN is doing to halt the advance of cybercrime

Protecting the Enterprise

9©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

40 to 50 million emails distributed in short bursts lasting only three-to five-minutes each

Map the Attack

10©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Using Botnet Data to Predict Malware Trends

CYREN Analysts are observing a direct relationship between zombies and malware, enabling future malware attack prediction.

11©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Sophisticated social engineering

Demonstrates extensive tools available to cybercriminals

• Using attack vectors that are ignored

Return of the Macro-virus

12©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Malware Year in Review

Malware Emails Malware URLs Zero-hourMalwaredetection

13©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Attacks aimed at businesses and consumers

Often a 1st step to corporate breach

Postbank.de attack

• Estimated 6.5 billion emails sent during the 1st day of the attack

• 19,000 different URLs in one 12-hour period

• Total of 78,000 unique URLs distributed over a few days

Phishing – Gateway to the Breach

14©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Phishing Year in Review

15©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

CYREN predicts continued growth in Mobile Malware

• Mobile Ransomware

• Near Field Communications Malware

• Pre-installed Mobile Malware

Malware on the Move

16©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Mobile Malware year in Review

17©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

40 to 50 million emails sent in short bursts lasting only three- to five-minutes each

Rapid Spam Attacks

18©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Spam Year in Review

19©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Poll Question

20©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Assessing Industrial IoT Threats in 2015 and Beyond

In the coming year, the enterprise – from its people, to its devices, to its physical infrastructure – will be more connected than ever

Includes industrial items like building management and physical security, connecting to ‘smart’ platforms

21©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

You can also find us here:

www.CYREN.com

twitter.com/cyreninc

linkedin.com/company/cyren

©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Thank You. Any Questions or Thoughts?


Recommended