Russian Bears Need Less Than 20 Minutes To Hack Your Data

Russian bears lead the way when it comes to gaining enough of a foothold in your networks to perform a successful data breach according to the 2019 Global Threat Report from CrowdStrike. This matters, because having an understanding of how quickly the bad guys can move across your networks is vital in getting to grips with the 1-10-60 rule. And that determines how likely you are to stop them succeeding in breaching your data.

The CrowdStrike Threat Graph, a massively scalable and cloud-based database, is described as being the brains behind the breakout time metric: a measurement of the speed that threat actors are able to move laterally within the targeted environment following the initial compromise and start propagating advanced exploits. The breakout time is of huge importance when it comes to securing networks as it represents the defensive window of opportunity; the time limit for defenders to respond, contain or remediate an intrusion before the attackers can move widely enough through a network to facilitate a major data breach. For the 2019 report, CrowdStrike analysts dove deeper into the threat graph data and calculated the breakout time for attributed incidents in order to determine just how quick major nation-state and criminal actors have become.

 

Read More 

Related Posts
Verizon: Most Breaches Trace to Phishing, Social Engineering
Ninety percent of data breaches seen by Verizon's data breach investigation team have a phishing or social engineering component to them. Not coincidentally, one of the hottest commodities on underground ...
READ MORE
Facebook bug exposed the Pirate posts of 14 million user, is this a GDPR breach?
Is this our first big GDPR breach. From what we can see due to a facebook bug the private data of 14 million user has become public. Private data becoming ...
READ MORE
Google Fined $57M in Largest GDPR Slap Yet
The French Data Protection Authority (DPA) found a lack of transparency when it comes to how Google harvests and uses personal data for ad-targeting purposes.France’s National Data Protection Commission (CNIL) ...
READ MORE
Cryptomining Malware Uninstalls Cloud Security Products
New samples of cryptomining malware performs a never-before-seen function: uninstalling cloud security products.Researchers say they have discovered a unique malware family capable of gaining admin rights on targeted systems by ...
READ MORE
Verizon: Most Breaches Trace to Phishing, Social Engineering
Facebook bug exposed the Pirate posts of 14

Leave a Reply

Your email address will not be published. Required fields are marked *

*

You might also likeclose