Saturday, May 21, 2022
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • How-Tos
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • Video
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • How-Tos
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • Video
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > WatchGuard released Internet Security Report for Q3 2019

WatchGuard released Internet Security Report for Q3 2019

Erdem Yasar by Erdem Yasar
December 12, 2019
in Cybersecurity
2 min read
0 0
0
WatchGuard released Internet Security Report for Q3 2019
1
SHARES
33
VIEWS
Share on FacebookShare on TwitterShare on EmailFollow on Google News

WatchGuard Technologies has announced the release of its Security Report for Q3 2019 that includes a list of popular attacks.

Network security and intelligence firm WatchGuard Technologies released the Internet Security Report for Q3 2019. Multiple Apache Struts vulnerabilities, including the one used in the Equifax data breach, appeared for the first time on the WatchGuard’s list. The report also shows us a significant rise in zero-day malware detections, increasing the use of Microsoft Office exploits and legitimate penetration testing tools.

List of most popular attacks

Apache Struts 2 Remote Code Execution: The major vulnerability is enabling attackers to install Python or make a custom HTTP request to exploit the vulnerability with a few lines of code and obtain shell access to an exposed system. Apache Struts 2 vulnerability was used in Equifax data breach and this is the first appearance of it on the WatchGuard’s list. This threat was accompanied by two additional Apache Struts vulnerabilities on the top ten network attacks list in Q3.

Microsoft Office exploits: Two malware variants affecting Microsoft Office products made it to the list, as well as the top ten most-widespread malware list last quarter. This means threat actors are doubling down on both the frequency with which they leverage Office-based attacks, as well as the number of victims they’re targeting. These attacks were mostly delivered by emails.

Zero-day malware instances: In Q3, zero-day malware instances spiked to 50% after stabilizing at around 38% for the past several quarters. Half of the malware attacks in Q3 were capable of bypassing traditional signature-based solutions. Thus, layered security services are needed to protect against advanced and ever-evolving threats.

Legitimate pentesting tools: Two new malware variants involving Kali Linux penetration testing tools are also making their first appearance on the list. One of them is Boxter, a PowerShell trojan used to download and install potentially unwanted programs. Another one is Hacktool.JQ, which is the only other authentication attack tool besides Mimikatz to make the list. It’s unclear whether attacks come from legitimate pentesting activities or malicious attackers leveraging readily available open-source tools.

Targetting Americas: More than 42% of attacks were targeting North, Central, and South America in Q3 2019. This represents a significant geographic shift in focus for attackers compared to last quarter, as EMEA and APAC accounted for 30% and 28% of all malware attacks in Q3. Motivations behind this shift are unclear.

Corey Nachreiner, chief technology officer at WatchGuard Technologies said:

“Our latest threat intelligence showcases the variability and sophistication of cybercriminals’ growing playbook. Not only are they leveraging notorious attacks, but they’re launching evasive malware campaigns and hijacking products, tools and domains we use every day. As threat actors continue to modify their tactics, organizations of every size must protect themselves, their customers and their partners with a set of layered security services that cover everything from the core network to endpoints to the users themselves.”

Source: 1

See more Cyber Security News


Tags: MalwareWatchGuard
Share1TweetSendShare
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy
Previous Post

i2Coalition launches VPN Trust Initiative

Next Post

ASHRAE releases a revised version of data center standard

Erdem Yasar

Erdem Yasar

Erdem Yasar is a news editor at Cloud7 News. Erdem started his career by writing video game reviews in 2007 for PC World magazine while he was studying computer engineering. In the following years, he focused on software development with various programming languages. After his graduation, he continued to work as an editor for several major tech-related websites and magazines. During the 2010s, Erdem Yasar shifted his focus to cloud computing, hosting, and data centers as they were becoming more popular topics in the tech industry. Erdem Yasar also worked with various industry-leading tech companies as a content creator by writing blog posts and other articles. Prior to his role at Cloud7 News, Erdem was the managing editor of T3 Magazine.

Related News

Microsoft SQL Servers Are Targeted With Brute - Force Attacks

Microsoft SQL servers are targeted with brute-force attacks

May 20, 2022 3:45 pm
Google OAuth client library for Java had a high severity flaw

Google OAuth client library for Java had a high severity flaw

May 20, 2022 2:45 pm
The Linux Malware XOR DDoS Is On The Rise Again

The Linux malware XOR DDoS is on the rise again

May 20, 2022 1:50 pm
Conti ransomware group is shut down

Conti ransomware group is shut down

May 20, 2022 12:10 pm
Next Post
ASHRAE releases a revised version of data center standard

ASHRAE releases a revised version of data center standard

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Editor's Choice

Interview with Igor Seletskiy on AlmaLinux

7 best hosting control panels

How to update Linux Kernel without rebooting?

7 best Linux mail servers for 2022

7 best cPanel alternatives for 2022

7 best Linux web browsers for 2022

cPanel Security: 7 steps to secure cPanel

7 best CentOS alternatives

7 best Linux server distros for 2022

How to scan your server for Log4j (Log4Shell) vulnerability

Best web hosting service providers

AlmaLinux 8.6 Stable is ready to download

Ubuntu 22.04 LTS is available for download. What is new?

Advertisement

Recent News

  • Intentional user-unfriendly interfaces of popular services
  • Snap app of the week: Glate
  • Weekly tips & tricks: Linux #4
  • [Event] Live Webinar – WordPress: Don’t Underestimate the Power of Plugins
  • Oracle Linux 8.6 is ready to download

Our Latest Interview

Interview: Erez Barak, Vice President Observability of Sumo Logic
Interview

Interview: Erez Barak, Vice President Observability of Sumo Logic

by Atalay Kelestemur
November 25, 2021 3:23 am


Cloud7 News is a news source that publishes the latest news, industry news and exclusive interviews on web hosting, cloud computing, data center, cybersecurity and linux.

News Categories

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • Blockchain

Our Free Modules

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About Us
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2022, Cloud7 News. Latest Cloud Computing, Web Hosting, Data Center Industry and Tech News

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • How-Tos
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • Video
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

© 2022, Cloud7 News. Latest Cloud Computing, Web Hosting, Data Center Industry and Tech News

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.