Story image

Cyber attackers still using oldest tricks in the book - yet they're still so good at hiding

17 Apr 2018

As New Zealand’s Privacy Bill makes its way through parliament, a key component of that Bill is the possibility of mandatory data breach notifications that may bring $10,000 penalties to non-compliant businesses.

Cisco is a trusted provider that is in the business of providing cybersecurity that can help New Zealand businesses be prepared for breaches from protection to mitigation.

According to Cisco’s 2018 Annual Cybersecurity Report, adversaries and nation-state actors have immense power – so much that they could take down critical infrastructure, critical systems and cripple entire regions.

It found that attackers are still using the oldest tricks in the books and they are also more adept at hiding - Cisco threat researchers analysed malicious email attachments that were equipped with various sandbox evasion techniques.

They discovered that the number of malicious samples using a particular sandbox evasion technique showed sharp peaks, and then quickly dropped. This is yet another example of how attackers are swift to ramp up the volume of attempts to break through defences once they find an effective technique.

The question is, how do you best protect your organisation, assets and employees with breach notification inching ever closer? Cisco is offering you an exclusive look at what kinds of threats you may face, and can also give you guidance about what to do next.

Cisco’s Annual Cybersecurity Report will take you on a tour of:

  • The evolution of malware, current email threats, sandbox evasion and IoT attacks
  • The costs of cyber attacks
  • What you should expect from your investments and training
SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.