Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

OT Risk Gets Serious, New Backdoor Samples Soar

Skybox Security’s 2020 Vulnerability and Threat Trends Report analyzes what shaped the threat landscape over 2019 and what it means for the year ahead

Skybox Security, a global leader in cybersecurity management, announced the release of its latest Vulnerability and Threat Trends Report which analyzes the vulnerabilities, exploits and threats in play over last year. The report, compiled by the team of security analysts at the Skybox Research Lab, aims to help organizations align their security strategy with the reality of the current threat landscape.

Key findings from the report include:

  • New backdoor samples quadrupled
  • OT advisories grew by over 50 percent
  • The number of new cryptomining samples halved between 2018 and 2019
  • Compared to 2018’s figures, vulnerabilities within Microsoft OSs increased by 66 percent in 2019

Ron Davidson, VP of R&D and CTO for Skybox Security commented on the increase in new OT advisories. “The need for greater protections within OT networks is clearer than ever: not only has a record number of new OT advisories been disclosed by ICS-CERT, the technology is also increasingly exposed to IT vulnerabilities as it becomes unavoidably linked with more internet-connected devices and applications. In order to combat this increasing threat, security teams need to find ways to passively discover vulnerabilities within OT networks and find alternatives to patching when patching isn’t an option.”

Recommended AI News: Artificial Solutions and Blue Prism Partner to Add Conversational AI to Business Automations

Related Posts
1 of 40,574

The decline in creation of new cryptomining samples is also notable. Last year, cryptominers became criminals’ malware of choice. This year, owing in large part to a global decline in the value of cryptocurrency, the creation of new miners has declined. More traditional forms of malware fill the gap left by cryptominers, with new backdoor samples becoming 2019’s top malware family, followed by ransomware (with new samples increasing by 116 percent) and botnets (with an increase of 83 percent).

Another takeaway from the report is that the volume of vulnerabilities with medium-severity Common Vulnerability Scoring System (CVSS) scores is increasing: while the total number of new vulnerability reports appears to be stabilizing – this year there was a modest rise of 3.8 percent to 17,220 new flaws – the share of medium-severity instances increased from 34 percent in 2018 to 40 percent in 2019. This increase comes at the expense of high-severity vulnerabilities, which declined by around 5 percent.

Recommended AI News: Neil Sahota, an IBM Master Inventor and United Nations AI Subject Matter Expert, Joins Nirveda Cognition’s Advisory Board

“Just because a vulnerability is classified as having medium severity, it doesn’t mean that it carries a medium risk,” said Sivan Nir, Threat Intelligence Team Leader at Skybox Security. “What matters is how each vulnerability relates to the security environment that it sits in. Security teams need to stop being blinded by CVSS scores. While they’re distracted by remediating all of their critical- and high-severity vulnerabilities, they could be ignoring an exposed medium-severity vulnerability. In order to better protect their infrastructure, the CISO needs to find smarter ways of working. This starts with gaining full network visibility and enforcing exposure-based remediation strategies.”

Whether protecting against backdoors and ransomware, threats to the OT network or simply trying to keep up with what vulnerability to fix next, incorporating accurate, up-to-date threat intelligence in vulnerability management programs will give organizations they edge they need to counter a dynamic threat landscape. Skybox’s approach formalizes this into a systematic process where vulnerabilities are discovered regularly and on demand; prioritized in the context of the network, assets and threats; and remediated or mitigated in accordance with the risk they pose. Such an approach is vital to being proactive against today’s threats and adaptive to those yet to come.

Recommended AI News: 180byTwo Launches Unifi an AI-Powered Customer Data and Identity Platform for B2B Marketers

Comments are closed, but trackbacks and pingbacks are open.