IT disaster recovery, cloud computing and information security news


Cyber hygiene is at an all-time low finds report

Keysight has published the third annual Security Report from Ixia, its cybersecurity and visibility business.  The 2019 report analyzes the biggest security findings over the past year from Ixia’s Application and Threat Intelligence (ATI) Research Center.

Key findings from the 2019 Security Report include:

Cyber hygiene is at an all-time low: IT vendors created code or configurations that led to many successful security breaches in 2018, but IT operations and security personnel also shared the blame. Well-known attacks and attack vectors remained successful because security personnel did not address vulnerabilities and apply patches. This was successful primarily due to two factors: ignorance of the latest patches and challenges in deploying patches in a timely manner.

Humans are the weakest link: in 2018, Ixia detected 662,618 phishing pages in the wild, and 8,546,295 pages hosting or infected by malware – so a successful attack requires only a single errant click on an email or link. A well-crafted and timed phishing attempt can encourage even savvy users to click on compromised links. Successful protection depends on a combination of proactive user education, blocking phishing attacks and malware that cross the network edge, and detecting and blocking lateral movement in a network.

Crypto-jacking activity continues to grow: this threat reached new peaks in 2018, with hackers combining multiple classic attacks to deliver nearly autonomous malware. Ixia honeypots captured several new exploits that run an EternalBlue scan, and when successful, deposit a cryptominer on the network.

Software security flaws caused the majority of product vulnerabilities: Ixia observed more new devices joining networks than ever before, but also more devices designed and deployed without proper measures to stop or even limit threats. Well-understood SQL injections and cross-site scripting vulnerabilities were used by bad actors to target web applications. Code sharing posed a risk despite efforts by the open source community to standardize controls and measures in web development.

Security vulnerability disclosures are a double-edged sword: both hackers and vendors benefit when vulnerabilities are announced, particularly zero-day exploits. Mirai, Drupalgeddon and the D-Link DSL-2750B remote code execution vulnerability are examples where hackers were able to move faster than vendors and IT teams.

Security Watchlist for 2019

The Ixia ATI team predicts the following six trends will pose the biggest threat to enterprises over the coming 18 months:  

  • Abuse of low-value endpoints will escalate;
  • Brute-force attacks on public-facing systems and resources will increase;
  • Cloud architectures create complexity that increase attack surfaces;
  • Phishing will continue to evolve;
  • Multiphase attacks that use lateral movement and internal traffic will increase;
  • Crypto mining/cryptojacking attacks will increase.

More details.

Want news and features emailed to you?

Signup to our free newsletters and never miss a story.

A website you can trust

The entire Continuity Central website is scanned daily by Sucuri to ensure that no malware exists within the site. This means that you can browse with complete confidence.

Business continuity?

Business continuity can be defined as 'the processes, procedures, decisions and activities to ensure that an organization can continue to function through an operational interruption'. Read more about the basics of business continuity here.

Get the latest news and information sent to you by email

Continuity Central provides a number of free newsletters which are distributed by email. To subscribe click here.