官术网_书友最值得收藏!

The shift in the threat landscape

In 2016, a new wave of attacks also gained mainstream visibility, when CrowdStrike reported that it had identified two separate Russian intelligence-affiliated adversaries present in the United States Democratic National Committee (DNC) network (19). According to their report, they found evidence that two Russian hacking groups were in the DNC network: Cozy Bear (also classified as APT29) and Fancy Bear (APT28). Cozy Bear was not a new actor in this type of attack, since evidence has shown that in 2015 (20) they were behind the attack against the Pentagon email system via spear phishing attacks.

This type of scenario is called Government-sponsored cyber attacks, but some specialists prefer to be more general and call it data as a weapon, since the intent is to steal information that can be used against the hacked party. The private sector should not ignore these signs.

Nowadays, continuous security monitoring must leverage at least the three methods shown in the following diagram:

This is just one of the reasons that it is becoming primordial that organizations start to invest more in threat intelligence, machine learning, and analytics to protect their assets. We will cover this in more detail in Chapter 12, Threat Intelligence.

主站蜘蛛池模板: 介休市| 呼图壁县| 保靖县| 岳池县| 兴国县| 广河县| 上饶县| 珠海市| 巴南区| 肃宁县| 连江县| 桂平市| 澳门| 平武县| 通河县| 湛江市| 五家渠市| 宁阳县| 新蔡县| 镇雄县| 海原县| 个旧市| 沙雅县| 巴青县| 高尔夫| 罗城| 彰化市| 惠水县| 铜梁县| 阿坝县| 汕尾市| 灵台县| 祥云县| 陆川县| 崇明县| 巴林右旗| 金平| 南平市| 漳浦县| 贡嘎县| 乌兰浩特市|