官术网_书友最值得收藏!

The shift in the threat landscape

In 2016, a new wave of attacks also gained mainstream visibility, when CrowdStrike reported that it had identified two separate Russian intelligence-affiliated adversaries present in the United States Democratic National Committee (DNC) network (19). According to their report, they found evidence that two Russian hacking groups were in the DNC network: Cozy Bear (also classified as APT29) and Fancy Bear (APT28). Cozy Bear was not a new actor in this type of attack, since evidence has shown that in 2015 (20) they were behind the attack against the Pentagon email system via spear phishing attacks.

This type of scenario is called Government-sponsored cyber attacks, but some specialists prefer to be more general and call it data as a weapon, since the intent is to steal information that can be used against the hacked party. The private sector should not ignore these signs.

Nowadays, continuous security monitoring must leverage at least the three methods shown in the following diagram:

This is just one of the reasons that it is becoming primordial that organizations start to invest more in threat intelligence, machine learning, and analytics to protect their assets. We will cover this in more detail in Chapter 12, Threat Intelligence.

主站蜘蛛池模板: 大方县| 昌平区| 贡觉县| 西林县| 罗甸县| 探索| 平定县| 马山县| 达孜县| 镇平县| 襄汾县| 松溪县| 邢台市| 北海市| 满城县| 大名县| 丹寨县| 吉水县| 德江县| 石嘴山市| 昭通市| 忻城县| 望江县| 渑池县| 凤冈县| 洛宁县| 苏州市| 苍溪县| 益阳市| 漯河市| 阿克陶县| 遵义市| 韶关市| 葵青区| 孝感市| 郴州市| 温泉县| 长垣县| 聂荣县| 九寨沟县| 株洲县|