The increase of the fileless threats in the first 6months of 2019 has been high. Due to reports gotten, cyber attackers are deploying treats that aren’t visible with the traditional security; they could corrupt your legitimate tools, execute and edit your system memory also. There has been an exploit kit about the 136 percentage increase compared to this time last year.

Due to the findings in 2019, research has found that the predictions Trend Micro made last year about how attackers are becoming way cleaver and looking for smarter ways to target businesses and environment that will provide good profit for them. Jon Clay, director of global treat communication for Trend Micro said, “The new strategy being used by attackers are sophistication and stealth in the name of cybersecurity game and technology, criminal attacks have become more connected and smarter”

“However, attackers have indulged in more crafty attacks to slowly take advantage of people, important documents and technology. The best way on the business side is to try eliminate the corporate attack, by employing technology partner that can combine human expertise with advanced security technologies to detect, respond to and remediate threats” Jon Clay adds.

Attackers increasingly began to deploy threats on servers and in cloud environments. Cryptomining malware remained the most detected threat in the first half of 2019. A substantial increase involved in inbound attack on routers and servers jumped to a 64 per cent compared to the first half of 2018.

Business email compromise (BEC) remains a major threat in which these attackers come through, statistics state that the detection jumping 52 per cent compared to the past six months. URLs, emails and Ransomware-related files also grew 77 per cent over the same period. The Trend Micro blocked more than 26.8 billion threats in the first half of 2019, over 6 billion more than the same period last year. To mitigate these advanced threats requires smart defense-in-depth that can correlate data from across gateways, networks, servers and endpoints to best identify and stop attacks.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.