Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Radware Releases Series II of Its 2021 Hacker’s Almanac

Offers threat intelligence on how bots, DDoS attacks, ransomware, and more are used to exploit supply chains, critical infrastructures, IOT devices, financial assets

Radware a leading provider of cyber security and application delivery solutions, introduced Series II of its 2021 Hacker’s Almanac. The three-part series is an infosecurity field guide for security and IT professionals as well as executive decision-makers with responsibility for safeguarding their organizations. In a lessons-learned format, Series II unwinds the tactics, techniques, and procedures (TTPs) used by notorious actors in real-world cyberattacks, and shows how these TTPs map up to the MITRE ATT&CK framework.

Recommended AI News: Talon Closes US$5MN Series A Round Led By Animoca Brands

The Hacker’s Almanac series serves as a cornerstone for helping organizations understand:

  • The threat landscape.
  • Why they might be at risk.
  • Their attack surface.
  • How attackers can target an environment

“Understanding the objectives, tactics, and methods of malicious actors is an important step in an organization’s journey to a balanced security strategy,” said Pascal Geenens, director of threat intelligence at Radware. “By gaining a deeper understanding of their adversaries’ TTPs, organizations will be better prepared to detect, isolate, deceive, and evict threat actors who might be targeting their environment.”

Related Posts
1 of 40,514

Recommended AI News: Avast Upgrades Browser Extension With Privacy Protection Capabilities

Series II of the Hacker’s Almanac describes tactics and techniques, ranging from the reconnaissance conducted to begin an operation and the initial access required to gain a foothold in a victim’s network, to the execution of the attack, defense evasion strategies, and exfiltration. It gives examples of real-world attacks that targeted supply chains, critical infrastructures, IOT devices, financial assets, and more. And it goes into detail on how bots, DDoS attacks, credential stuffing, router hijacking, and other techniques and extortion tactics are used to exploit their victims.

“If there was one word to capture what organizations should expect from cybercrime in 2022, it would be ‘more,’” said Geenens. “More sophisticated, high intensity attacks. Smarter attackers with larger budgets. Increased pressure on supply chains and critical infrastructures. And bigger, bolder extortion threats. In short, the security community will have to be more vigilant than ever before, and organizations will need to make considerable efforts to keep their attack surfaces under control. The last two years ushered in a new dawn for cybercrime and info security, and it’s not going away anytime soon.”

Released earlier this year, Series I of the Hacker’s Almanac offers an overview of current threat actors. A copy of this report can be obtained here.

Recommended AI News: adidas Migrates SAP Environments To AWS

[To share your insights with us, please write to sghosh@martechseries.com]

Comments are closed.