際際滷shows by User: ThreatIntel / http://www.slideshare.net/images/logo.gif 際際滷shows by User: ThreatIntel / Mon, 09 Apr 2018 15:56:45 GMT 際際滷Share feed for 際際滷shows by User: ThreatIntel ISTR 23: Internet Security Threat Report /slideshow/istr-23-internet-security-threat-report-93345223/93345223 istr23-internetsecuritythreatreport-180409155645
ISTR 23 is Symantec's annual threat report about the cyber security threat landscape. Find out about the new trend of cryptojacking, what ransomware criminals are up to now, and why you still need to be mobile security aware. Read the full report here: http://go.symantec.com/istr]]>

ISTR 23 is Symantec's annual threat report about the cyber security threat landscape. Find out about the new trend of cryptojacking, what ransomware criminals are up to now, and why you still need to be mobile security aware. Read the full report here: http://go.symantec.com/istr]]>
Mon, 09 Apr 2018 15:56:45 GMT /slideshow/istr-23-internet-security-threat-report-93345223/93345223 ThreatIntel@slideshare.net(ThreatIntel) ISTR 23: Internet Security Threat Report ThreatIntel ISTR 23 is Symantec's annual threat report about the cyber security threat landscape. Find out about the new trend of cryptojacking, what ransomware criminals are up to now, and why you still need to be mobile security aware. Read the full report here: http://go.symantec.com/istr <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/istr23-internetsecuritythreatreport-180409155645-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> ISTR 23 is Symantec&#39;s annual threat report about the cyber security threat landscape. Find out about the new trend of cryptojacking, what ransomware criminals are up to now, and why you still need to be mobile security aware. Read the full report here: http://go.symantec.com/istr
ISTR 23: Internet Security Threat Report from Symantec Security Response
]]>
1468 5 https://cdn.slidesharecdn.com/ss_thumbnails/istr23-internetsecuritythreatreport-180409155645-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Sowbug: Cyber espionage group targets South American and Southeast Asian governments /slideshow/sowbug-cyber-espionage-group-targets-south-american-and-southeast-asian-governments/88730782 customerpresentation-sowbugedited-180223153949
A previously unknown cyber espionage group called Sowbug has been conducting highly targeted cyber attacks against organizations in South America and Southeast Asia and appears to be heavily focused on foreign policy institutions and diplomatic targets. Find out more in this presentation. Further reading: https://www.symantec.com/connect/blogs/sowbug-cyber-espionage-group-targets-south-american-and-southeast-asian-governments]]>

A previously unknown cyber espionage group called Sowbug has been conducting highly targeted cyber attacks against organizations in South America and Southeast Asia and appears to be heavily focused on foreign policy institutions and diplomatic targets. Find out more in this presentation. Further reading: https://www.symantec.com/connect/blogs/sowbug-cyber-espionage-group-targets-south-american-and-southeast-asian-governments]]>
Fri, 23 Feb 2018 15:39:49 GMT /slideshow/sowbug-cyber-espionage-group-targets-south-american-and-southeast-asian-governments/88730782 ThreatIntel@slideshare.net(ThreatIntel) Sowbug: Cyber espionage group targets South American and Southeast Asian governments ThreatIntel A previously unknown cyber espionage group called Sowbug has been conducting highly targeted cyber attacks against organizations in South America and Southeast Asia and appears to be heavily focused on foreign policy institutions and diplomatic targets. Find out more in this presentation. Further reading: https://www.symantec.com/connect/blogs/sowbug-cyber-espionage-group-targets-south-american-and-southeast-asian-governments <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/customerpresentation-sowbugedited-180223153949-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A previously unknown cyber espionage group called Sowbug has been conducting highly targeted cyber attacks against organizations in South America and Southeast Asia and appears to be heavily focused on foreign policy institutions and diplomatic targets. Find out more in this presentation. Further reading: https://www.symantec.com/connect/blogs/sowbug-cyber-espionage-group-targets-south-american-and-southeast-asian-governments
Sowbug: Cyber espionage group targets South American and Southeast Asian governments from Symantec Security Response
]]>
744 1 https://cdn.slidesharecdn.com/ss_thumbnails/customerpresentation-sowbugedited-180223153949-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Threat landscape update: June to September 2017 /slideshow/threat-landscape-update-june-to-september-2017/81559337 threatlandscapeq2-2017edited-171103150409
Read about the latest trends in the threat landscape as seen between June and September 2017, including BEC and ransomware.]]>

Read about the latest trends in the threat landscape as seen between June and September 2017, including BEC and ransomware.]]>
Fri, 03 Nov 2017 15:04:09 GMT /slideshow/threat-landscape-update-june-to-september-2017/81559337 ThreatIntel@slideshare.net(ThreatIntel) Threat landscape update: June to September 2017 ThreatIntel Read about the latest trends in the threat landscape as seen between June and September 2017, including BEC and ransomware. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/threatlandscapeq2-2017edited-171103150409-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Read about the latest trends in the threat landscape as seen between June and September 2017, including BEC and ransomware.
Threat landscape update: June to September 2017 from Symantec Security Response
]]>
1844 3 https://cdn.slidesharecdn.com/ss_thumbnails/threatlandscapeq2-2017edited-171103150409-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Email threats 2017: Users encounter threats through email twice as often as other infection vectors /slideshow/email-threats-2017-users-encounter-threats-through-email-twice-as-often-as-other-infection-vectors/81559127 emailthreats2017-171103145944
Email Threats 2017 casts a light on a threat landscape where attackers are actively spreading malicious threats, BEC scams, and a variety of spam through email.]]>

Email Threats 2017 casts a light on a threat landscape where attackers are actively spreading malicious threats, BEC scams, and a variety of spam through email.]]>
Fri, 03 Nov 2017 14:59:44 GMT /slideshow/email-threats-2017-users-encounter-threats-through-email-twice-as-often-as-other-infection-vectors/81559127 ThreatIntel@slideshare.net(ThreatIntel) Email threats 2017: Users encounter threats through email twice as often as other infection vectors ThreatIntel Email Threats 2017 casts a light on a threat landscape where attackers are actively spreading malicious threats, BEC scams, and a variety of spam through email. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/emailthreats2017-171103145944-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Email Threats 2017 casts a light on a threat landscape where attackers are actively spreading malicious threats, BEC scams, and a variety of spam through email.
Email threats 2017: Users encounter threats through email twice as often as other infection vectors from Symantec Security Response
]]>
3904 5 https://cdn.slidesharecdn.com/ss_thumbnails/emailthreats2017-171103145944-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Dragonfly: Western energy sector targeted by sophisticated attack group /slideshow/dragonfly-western-energy-sector-targeted-by-sophisticated-attack-group/79899036 dragonfly-external-170918154526
Symantec found evidence linking a recent campaign of cyber attacks on the energy sector in Europe and the U.S. to a group called Dragonfly, which was first seen in 2011. This "Dragonfly 2.0" campaign appears to have begun in 2015, with an increase in activity seen since the beginning of 2017. Read more about this group in Symantec Security Response's blogs: https://www.symantec.com/connect/blogs/dragonfly-western-energy-sector-targeted-sophisticated-attack-group Dragonfly 1.0: https://www.symantec.com/connect/blogs/dragonfly-western-energy-companies-under-sabotage-threat-energetic-bear]]>

Symantec found evidence linking a recent campaign of cyber attacks on the energy sector in Europe and the U.S. to a group called Dragonfly, which was first seen in 2011. This "Dragonfly 2.0" campaign appears to have begun in 2015, with an increase in activity seen since the beginning of 2017. Read more about this group in Symantec Security Response's blogs: https://www.symantec.com/connect/blogs/dragonfly-western-energy-sector-targeted-sophisticated-attack-group Dragonfly 1.0: https://www.symantec.com/connect/blogs/dragonfly-western-energy-companies-under-sabotage-threat-energetic-bear]]>
Mon, 18 Sep 2017 15:45:26 GMT /slideshow/dragonfly-western-energy-sector-targeted-by-sophisticated-attack-group/79899036 ThreatIntel@slideshare.net(ThreatIntel) Dragonfly: Western energy sector targeted by sophisticated attack group ThreatIntel Symantec found evidence linking a recent campaign of cyber attacks on the energy sector in Europe and the U.S. to a group called Dragonfly, which was first seen in 2011. This "Dragonfly 2.0" campaign appears to have begun in 2015, with an increase in activity seen since the beginning of 2017. Read more about this group in Symantec Security Response's blogs: https://www.symantec.com/connect/blogs/dragonfly-western-energy-sector-targeted-sophisticated-attack-group Dragonfly 1.0: https://www.symantec.com/connect/blogs/dragonfly-western-energy-companies-under-sabotage-threat-energetic-bear <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dragonfly-external-170918154526-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Symantec found evidence linking a recent campaign of cyber attacks on the energy sector in Europe and the U.S. to a group called Dragonfly, which was first seen in 2011. This &quot;Dragonfly 2.0&quot; campaign appears to have begun in 2015, with an increase in activity seen since the beginning of 2017. Read more about this group in Symantec Security Response&#39;s blogs: https://www.symantec.com/connect/blogs/dragonfly-western-energy-sector-targeted-sophisticated-attack-group Dragonfly 1.0: https://www.symantec.com/connect/blogs/dragonfly-western-energy-companies-under-sabotage-threat-energetic-bear
Dragonfly: Western energy sector targeted by sophisticated attack group from Symantec Security Response
]]>
1765 4 https://cdn.slidesharecdn.com/ss_thumbnails/dragonfly-external-170918154526-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Ransomware 2017: New threats emerge /slideshow/ransomware-2017-new-threats-emerge-79898734/79898734 ransomware2017-170918153748
Ransomware continues to be a major threat. This slidedeck looks at the first six months of 2017, examines why enterprises are being increasingly impacted by ransomware, and reviews the effect of high-profile incidents such as WannaCry and Petya. For more on this area, read Symantec Security Response's blog and whitepaper: https://www.symantec.com/connect/blogs/businesses-most-risk-new-breed-ransomware]]>

Ransomware continues to be a major threat. This slidedeck looks at the first six months of 2017, examines why enterprises are being increasingly impacted by ransomware, and reviews the effect of high-profile incidents such as WannaCry and Petya. For more on this area, read Symantec Security Response's blog and whitepaper: https://www.symantec.com/connect/blogs/businesses-most-risk-new-breed-ransomware]]>
Mon, 18 Sep 2017 15:37:48 GMT /slideshow/ransomware-2017-new-threats-emerge-79898734/79898734 ThreatIntel@slideshare.net(ThreatIntel) Ransomware 2017: New threats emerge ThreatIntel Ransomware continues to be a major threat. This slidedeck looks at the first six months of 2017, examines why enterprises are being increasingly impacted by ransomware, and reviews the effect of high-profile incidents such as WannaCry and Petya. For more on this area, read Symantec Security Response's blog and whitepaper: https://www.symantec.com/connect/blogs/businesses-most-risk-new-breed-ransomware <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ransomware2017-170918153748-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Ransomware continues to be a major threat. This slidedeck looks at the first six months of 2017, examines why enterprises are being increasingly impacted by ransomware, and reviews the effect of high-profile incidents such as WannaCry and Petya. For more on this area, read Symantec Security Response&#39;s blog and whitepaper: https://www.symantec.com/connect/blogs/businesses-most-risk-new-breed-ransomware
Ransomware 2017: New threats emerge from Symantec Security Response
]]>
1472 4 https://cdn.slidesharecdn.com/ss_thumbnails/ransomware2017-170918153748-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Financial threats review 2017 /slideshow/financial-threats-review-2017/78348034 financialthreats-170728154608
While financial threats tend not to get as much news coverage as ransomware, maybe because they have a less visual impact, they are far more prevalent. With over 1.2 million annual detections, the financial threat space is 2.5 times bigger than that of ransomware. Further Reading Financial malware more than twice as prevalent as ransomware (https://www.symantec.com/connect/blogs/financial-malware-more-twice-prevalent-ransomware) Financial threats review 2017 (https://www.symantec.com/content/dam/symantec/docs/security-center/white-papers/istr-financial-threats-review-2017-en.pdf) ]]>

While financial threats tend not to get as much news coverage as ransomware, maybe because they have a less visual impact, they are far more prevalent. With over 1.2 million annual detections, the financial threat space is 2.5 times bigger than that of ransomware. Further Reading Financial malware more than twice as prevalent as ransomware (https://www.symantec.com/connect/blogs/financial-malware-more-twice-prevalent-ransomware) Financial threats review 2017 (https://www.symantec.com/content/dam/symantec/docs/security-center/white-papers/istr-financial-threats-review-2017-en.pdf) ]]>
Fri, 28 Jul 2017 15:46:08 GMT /slideshow/financial-threats-review-2017/78348034 ThreatIntel@slideshare.net(ThreatIntel) Financial threats review 2017 ThreatIntel While financial threats tend not to get as much news coverage as ransomware, maybe because they have a less visual impact, they are far more prevalent. With over 1.2 million annual detections, the financial threat space is 2.5 times bigger than that of ransomware. Further Reading Financial malware more than twice as prevalent as ransomware (https://www.symantec.com/connect/blogs/financial-malware-more-twice-prevalent-ransomware) Financial threats review 2017 (https://www.symantec.com/content/dam/symantec/docs/security-center/white-papers/istr-financial-threats-review-2017-en.pdf) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/financialthreats-170728154608-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> While financial threats tend not to get as much news coverage as ransomware, maybe because they have a less visual impact, they are far more prevalent. With over 1.2 million annual detections, the financial threat space is 2.5 times bigger than that of ransomware. Further Reading Financial malware more than twice as prevalent as ransomware (https://www.symantec.com/connect/blogs/financial-malware-more-twice-prevalent-ransomware) Financial threats review 2017 (https://www.symantec.com/content/dam/symantec/docs/security-center/white-papers/istr-financial-threats-review-2017-en.pdf)
Financial threats review 2017 from Symantec Security Response
]]>
1310 7 https://cdn.slidesharecdn.com/ss_thumbnails/financialthreats-170728154608-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Living off the land and fileless attack techniques /slideshow/living-off-the-land-and-fileless-attack-techniques/78346526 livingofftheland-170728145413
There is increased discussion around threats that adopt so-called living off the land tactics. Attackers are increasingly making use of tools already installed on targeted computers or are running simple scripts and shellcode directly in memory. Creating fewer new files on the hard disk, or being completely fileless, means less chance of being detected by traditional security tools and therefore minimizes the risk of an attack being blocked. Using simple and clean dual-use tools allows the attacker to hide in plain sight among legitimate system administration work. Further reading: Attackers are increasingly living off the land (https://www.symantec.com/connect/blogs/attackers-are-increasingly-living-land) Living off the land and fileless attack techniques (https://www.symantec.com/content/dam/symantec/docs/security-center/white-papers/istr-living-off-the-land-and-fileless-attack-techniques-en.pdf)]]>

There is increased discussion around threats that adopt so-called living off the land tactics. Attackers are increasingly making use of tools already installed on targeted computers or are running simple scripts and shellcode directly in memory. Creating fewer new files on the hard disk, or being completely fileless, means less chance of being detected by traditional security tools and therefore minimizes the risk of an attack being blocked. Using simple and clean dual-use tools allows the attacker to hide in plain sight among legitimate system administration work. Further reading: Attackers are increasingly living off the land (https://www.symantec.com/connect/blogs/attackers-are-increasingly-living-land) Living off the land and fileless attack techniques (https://www.symantec.com/content/dam/symantec/docs/security-center/white-papers/istr-living-off-the-land-and-fileless-attack-techniques-en.pdf)]]>
Fri, 28 Jul 2017 14:54:13 GMT /slideshow/living-off-the-land-and-fileless-attack-techniques/78346526 ThreatIntel@slideshare.net(ThreatIntel) Living off the land and fileless attack techniques ThreatIntel There is increased discussion around threats that adopt so-called living off the land tactics. Attackers are increasingly making use of tools already installed on targeted computers or are running simple scripts and shellcode directly in memory. Creating fewer new files on the hard disk, or being completely fileless, means less chance of being detected by traditional security tools and therefore minimizes the risk of an attack being blocked. Using simple and clean dual-use tools allows the attacker to hide in plain sight among legitimate system administration work. Further reading: Attackers are increasingly living off the land (https://www.symantec.com/connect/blogs/attackers-are-increasingly-living-land) Living off the land and fileless attack techniques (https://www.symantec.com/content/dam/symantec/docs/security-center/white-papers/istr-living-off-the-land-and-fileless-attack-techniques-en.pdf) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/livingofftheland-170728145413-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> There is increased discussion around threats that adopt so-called living off the land tactics. Attackers are increasingly making use of tools already installed on targeted computers or are running simple scripts and shellcode directly in memory. Creating fewer new files on the hard disk, or being completely fileless, means less chance of being detected by traditional security tools and therefore minimizes the risk of an attack being blocked. Using simple and clean dual-use tools allows the attacker to hide in plain sight among legitimate system administration work. Further reading: Attackers are increasingly living off the land (https://www.symantec.com/connect/blogs/attackers-are-increasingly-living-land) Living off the land and fileless attack techniques (https://www.symantec.com/content/dam/symantec/docs/security-center/white-papers/istr-living-off-the-land-and-fileless-attack-techniques-en.pdf)
Living off the land and fileless attack techniques from Symantec Security Response
]]>
4180 8 https://cdn.slidesharecdn.com/ss_thumbnails/livingofftheland-170728145413-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
PowerShell: The increased use of PowerShell in cyber attacks /slideshow/powershell-the-increased-use-of-powershell-in-cyber-attacks/78344996 powershell-170728140311
Malicious PowerShell scripts are on the rise, as attackers are using the frameworks flexibility to download their payloads, traverse through a compromised network, and carry out reconnaissance. Symantec analyzed PowerShell malware samples to find out how much of a danger they posed. Further reading: PowerShell threats surge: 95.4 percent of analyzed scripts were malicious (https://www.symantec.com/connect/blogs/powershell-threats-surge-954-percent-analyzed-scripts-were-malicious) The increased use of PowerShell in attacks (https://www.symantec.com/content/dam/symantec/docs/security-center/white-papers/increased-use-of-powershell-in-attacks-16-en.pdf)]]>

Malicious PowerShell scripts are on the rise, as attackers are using the frameworks flexibility to download their payloads, traverse through a compromised network, and carry out reconnaissance. Symantec analyzed PowerShell malware samples to find out how much of a danger they posed. Further reading: PowerShell threats surge: 95.4 percent of analyzed scripts were malicious (https://www.symantec.com/connect/blogs/powershell-threats-surge-954-percent-analyzed-scripts-were-malicious) The increased use of PowerShell in attacks (https://www.symantec.com/content/dam/symantec/docs/security-center/white-papers/increased-use-of-powershell-in-attacks-16-en.pdf)]]>
Fri, 28 Jul 2017 14:03:11 GMT /slideshow/powershell-the-increased-use-of-powershell-in-cyber-attacks/78344996 ThreatIntel@slideshare.net(ThreatIntel) PowerShell: The increased use of PowerShell in cyber attacks ThreatIntel Malicious PowerShell scripts are on the rise, as attackers are using the frameworks flexibility to download their payloads, traverse through a compromised network, and carry out reconnaissance. Symantec analyzed PowerShell malware samples to find out how much of a danger they posed. Further reading: PowerShell threats surge: 95.4 percent of analyzed scripts were malicious (https://www.symantec.com/connect/blogs/powershell-threats-surge-954-percent-analyzed-scripts-were-malicious) The increased use of PowerShell in attacks (https://www.symantec.com/content/dam/symantec/docs/security-center/white-papers/increased-use-of-powershell-in-attacks-16-en.pdf) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/powershell-170728140311-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Malicious PowerShell scripts are on the rise, as attackers are using the frameworks flexibility to download their payloads, traverse through a compromised network, and carry out reconnaissance. Symantec analyzed PowerShell malware samples to find out how much of a danger they posed. Further reading: PowerShell threats surge: 95.4 percent of analyzed scripts were malicious (https://www.symantec.com/connect/blogs/powershell-threats-surge-954-percent-analyzed-scripts-were-malicious) The increased use of PowerShell in attacks (https://www.symantec.com/content/dam/symantec/docs/security-center/white-papers/increased-use-of-powershell-in-attacks-16-en.pdf)
PowerShell: The increased use of PowerShell in cyber attacks from Symantec Security Response
]]>
7283 7 https://cdn.slidesharecdn.com/ss_thumbnails/powershell-170728140311-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Shamoon attacks - Destructive malware targeting Middle East organizations /slideshow/shamoon-attacks-destructive-malware-targeting-middle-east-organizations/78312795 shamoonattacks-170727142912
Shamoon is a a destructive disk-wiping malware that first emerged in 2012, before reappearing towards the end of 2016. This sophisticated malware appears to specifically target organizations in Saudi Arabia. ]]>

Shamoon is a a destructive disk-wiping malware that first emerged in 2012, before reappearing towards the end of 2016. This sophisticated malware appears to specifically target organizations in Saudi Arabia. ]]>
Thu, 27 Jul 2017 14:29:12 GMT /slideshow/shamoon-attacks-destructive-malware-targeting-middle-east-organizations/78312795 ThreatIntel@slideshare.net(ThreatIntel) Shamoon attacks - Destructive malware targeting Middle East organizations ThreatIntel Shamoon is a a destructive disk-wiping malware that first emerged in 2012, before reappearing towards the end of 2016. This sophisticated malware appears to specifically target organizations in Saudi Arabia. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/shamoonattacks-170727142912-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Shamoon is a a destructive disk-wiping malware that first emerged in 2012, before reappearing towards the end of 2016. This sophisticated malware appears to specifically target organizations in Saudi Arabia.
Shamoon attacks - Destructive malware targeting Middle East organizations from Symantec Security Response
]]>
1296 2 https://cdn.slidesharecdn.com/ss_thumbnails/shamoonattacks-170727142912-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
WannaCry ransomware outbreak - what you need to know /slideshow/wannacry-ransomware-outbreak-what-you-need-to-know/78275221 wannacryransomware-170726142237
The WannaCry ransomware outbreak shook the world when it occured in May 2017. This slidedeck looks at the attack, how it was carried out, and its success rate. It also attempts to figure out who was likely to have been behind this devastating cyber attack. For more information on this outbreak, take a look at these additional resources: What you need to know about the WannaCry Ransomware: https://www.symantec.com/connect/blogs/wannacry-3 WannaCry: Ransomware attacks show strong links to Lazarus group: https://www.symantec.com/connect/blogs/wannacry-ransomware-attacks-show-strong-links-lazarus-group Can files locked by WannaCry be decrypted: A technical analysis: https://medium.com/threat-intel/wannacry-ransomware-decryption-821c7e3f0a2b ]]>

The WannaCry ransomware outbreak shook the world when it occured in May 2017. This slidedeck looks at the attack, how it was carried out, and its success rate. It also attempts to figure out who was likely to have been behind this devastating cyber attack. For more information on this outbreak, take a look at these additional resources: What you need to know about the WannaCry Ransomware: https://www.symantec.com/connect/blogs/wannacry-3 WannaCry: Ransomware attacks show strong links to Lazarus group: https://www.symantec.com/connect/blogs/wannacry-ransomware-attacks-show-strong-links-lazarus-group Can files locked by WannaCry be decrypted: A technical analysis: https://medium.com/threat-intel/wannacry-ransomware-decryption-821c7e3f0a2b ]]>
Wed, 26 Jul 2017 14:22:37 GMT /slideshow/wannacry-ransomware-outbreak-what-you-need-to-know/78275221 ThreatIntel@slideshare.net(ThreatIntel) WannaCry ransomware outbreak - what you need to know ThreatIntel The WannaCry ransomware outbreak shook the world when it occured in May 2017. This slidedeck looks at the attack, how it was carried out, and its success rate. It also attempts to figure out who was likely to have been behind this devastating cyber attack. For more information on this outbreak, take a look at these additional resources: What you need to know about the WannaCry Ransomware: https://www.symantec.com/connect/blogs/wannacry-3 WannaCry: Ransomware attacks show strong links to Lazarus group: https://www.symantec.com/connect/blogs/wannacry-ransomware-attacks-show-strong-links-lazarus-group Can files locked by WannaCry be decrypted: A technical analysis: https://medium.com/threat-intel/wannacry-ransomware-decryption-821c7e3f0a2b <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/wannacryransomware-170726142237-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The WannaCry ransomware outbreak shook the world when it occured in May 2017. This slidedeck looks at the attack, how it was carried out, and its success rate. It also attempts to figure out who was likely to have been behind this devastating cyber attack. For more information on this outbreak, take a look at these additional resources: What you need to know about the WannaCry Ransomware: https://www.symantec.com/connect/blogs/wannacry-3 WannaCry: Ransomware attacks show strong links to Lazarus group: https://www.symantec.com/connect/blogs/wannacry-ransomware-attacks-show-strong-links-lazarus-group Can files locked by WannaCry be decrypted: A technical analysis: https://medium.com/threat-intel/wannacry-ransomware-decryption-821c7e3f0a2b
WannaCry ransomware outbreak - what you need to know from Symantec Security Response
]]>
1752 6 https://cdn.slidesharecdn.com/ss_thumbnails/wannacryransomware-170726142237-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-ThreatIntel-48x48.jpg?cb=1524583232 Insights into the world of threat intelligence, cybercrime and IT security. Brought to you by researchers at Symantec. www.symantec.com/connect/symantec-blogs/sr https://cdn.slidesharecdn.com/ss_thumbnails/istr23-internetsecuritythreatreport-180409155645-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/istr-23-internet-security-threat-report-93345223/93345223 ISTR 23: Internet Secu... https://cdn.slidesharecdn.com/ss_thumbnails/customerpresentation-sowbugedited-180223153949-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/sowbug-cyber-espionage-group-targets-south-american-and-southeast-asian-governments/88730782 Sowbug: Cyber espionag... https://cdn.slidesharecdn.com/ss_thumbnails/threatlandscapeq2-2017edited-171103150409-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/threat-landscape-update-june-to-september-2017/81559337 Threat landscape updat...