home_banner `

Content Icon

Overview of Most Common Threat Actors

September 27, 2018 | Content Aggregator - Single Slide | Threat Detection and Hunt Teaming

The most common threat actors responsible for 2017 cyber attacks were cybercriminals (33%). Hackers, which can also be non-criminals hired to help companies detect vulnerabilities and lock down defenses, were responsible for discovering 23% of exploits, while non-malicious insiders were blamed for 14% of exploits.
IANS

 SUBSCRIPTION REQUIRED


Already a client?

Log In to Continue

Not a client?

Request More Information

Related Research

Cryptocurrency Exchange Theft Reached $950 Million in 2018

Theft of cryptocurrency from exchanges and infrastructure climbed to $950 million in 2018 at an 84% compound annual growth rate (CAGR) from 2016. More than three-and-a-half times more cryptocurrency was stolen from exchanges in 2018 than in 2017.

Threat Hunting 101: Understand the Basics

What's the best low- or no-cost way to get started with threat hunting? In this Ask-an-Expert written response, IANS Faculty Ken Van Wyk offers tips for uncovering the most common forms of system compromise and suggests places where tools and automation can help.

Using MITRE ATT&CK™ for Coverage and Effectiveness Assessments

The MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) Framework is fast becoming the go-to model for known cyber adversary behavior, reflecting the phases of the attack lifecycle as well as commonly targeted platforms. In this webinar, TrustedSec CSO Practice Lead Rockie Brockway and TrustedSec Senior Consultant Rick Yocum walk through the framework’s components and how to put them to the best use when doing assessments in your organization.

Evaluate Adding UEBA and AI/ML to a Mature SOC

Would UEBA add any value to a mature SOC with custom security analytics? In this Ask-an-Expert live interaction, IANS Faculty Mike Rothman says it's tough to beat mature processes and custom analytics, and that a better use of resources would be focusing on training and honing current processes.