SlideShare une entreprise Scribd logo
1  sur  57
Télécharger pour lire hors ligne
Top Security Trends for 2014
Amichai Shulman, CTO, Imperva

1

© 2013 Imperva, Inc. All rights reserved.
Agenda
§  Introduction
§  2013 forecast scorecard
§  2014 security trends
§  Summary and conclusion
§  Q&A

2

© 2013 Imperva, Inc. All rights reserved.
Amichai Shulman – CTO, Imperva
§  Speaker at industry events
•  RSA, Appsec, Info Security UK, Black Hat

§  Lecturer on information security
•  Technion - Israel Institute of Technology

§  Former security consultant to banks and financial
services firms
§  Leads the Imperva Application Defense Center (ADC)
•  Discovered over 20 commercial application vulnerabilities
§  Credited by Oracle, MS-SQL, IBM and others

Amichai Shulman one of InfoWorld’s “Top 25 CTOs”

3

© 2013 Imperva, Inc. All rights reserved.
2013 Forecast Scorecard

Trend

Score

1

C

2

Government	
  malware	
  goes	
  commercial

B+

3

Black	
  clouds	
  on	
  the	
  horizon

B+

4

Community	
  policing

A

5

4

Hack%vism	
  gets	
  process	
  driven	
  

APT	
  targets	
  the	
  li?le	
  guy

A

© 2013 Imperva, Inc. All rights reserved.
#1 - 3rd Party is “No Party”

5

© 2013 Imperva, Inc. All rights reserved.
Known Vulnerabilities: The Known Knowns
§  There are known knowns; these are things we know that
we know…
•  Donald Rumsfeld, U.S. Secretary of Defense, February 2002

§  3rd Party Known vulnerabilities
Vulnerable components (e.g., framework libraries) can be identified
and exploited
(OWASP: https://www.owasp.org/index.php/Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities)

6

© 2013 Imperva, Inc. All rights reserved.
Rich Attack Surface
According to Veracode:
•  Up to 70% of internally developed code originates outside of the
development team
•  28% of assessed applications are identified as created by a 3rd
party

7

© 2013 Imperva, Inc. All rights reserved.
Security Falls Between the Cracks
§  Application developers
•  Introduce 3rd party code into the system
•  Not responsible for 3rd party code security (or
quality)
•  Not responsible for run-time configuration of 3rd
party components

§  IT operations
•  Not always aware of 3rd party components
§  Web server type is more visible than a library

•  Reluctant to change configuration settings that
might impact application behavior

8

© 2013 Imperva, Inc. All rights reserved.
2014 Forecast: Bigger! Stronger! Faster!
§  Bigger! – More Vulnerabilities!
§  Stronger! – As a result of the
of the vulnerabilities’ market
richness, attackers will create
vulnerabilities “mash-ups,”
combining several different
vulnerabilities together
§  Faster! – Shorter time from
vulnerabilities’ full disclosure
to exploits in the wild

Source: http://cdn.thinksteroids.com

9

© 2013 Imperva, Inc. All rights reserved.
Bigger! Disclosure Rate Increases
§  More software + more security researchers + more
bounty programs = more vulnerabilities’ disclosures
§  CVE IDs Enumeration syntax was changed to track more
than 10,000 vulnerabilities in a single year, starting on
2014

10

© 2013 Imperva, Inc. All rights reserved.
Stronger! Vulnerabilities “Mash-Up”
§  Take several “cheap” (low CVSS impact score) known
vulnerabilities
•  CVE-2010-3065: PHP
§  NIST assigned impact score: 2.9

•  CVE-2011-2505: PHPMyAdmin session modification vulnerability
§  NIST assigned impact score: 4.9

§  To create a shining exploit
•  PHPMyAdmin full server takeover exploit
•  Effective impact score: a perfect 10

§  Read more on Imperva’s HII report:
http://www.imperva.com/docs/HII_PHP_SuperGlobals_Supersized_Trouble.pdf

11

© 2013 Imperva, Inc. All rights reserved.
Stronger! 1 + 1 = 3

12

© 2013 Imperva, Inc. All rights reserved.
Faster! Vulnerability Weaponization
§  Since a vulnerability has a limited time span, attackers
strive for a faster vulnerability weaponization
§  We had witnessed weaponization time cut from weeks to
days
§  Infrastructure is the key to fast weaponization
•  Exploit code is often publicly available
•  Dormant botnets are ready to launch the attack
•  Command and Control (C2) servers and zombies support
§  Dynamic content
§  Dynamic targets

13

© 2013 Imperva, Inc. All rights reserved.
#2 - Server Based APT Alternative

14

© 2013 Imperva, Inc. All rights reserved.
Web Servers Infection is the New Black
§  Goals of infecting corporate work stations
•  Harness computing resources
§  Network bandwidth to be used in DDoS attacks
§  CPU power to mine Bitcoins

•  Use as a bridgehead into the corporate datacenter

§  Both goals are better achieved by targeting web servers
•  More powerful
•  Inherently connected to the corporate datacenter

15

© 2013 Imperva, Inc. All rights reserved.
Traditional Infiltration Attack

16

© 2013 Imperva, Inc. All rights reserved.
Why Start with Web Servers?
§  Easier reconnaissance
•  Detect type and components, discover vulnerabilities

§  Accept inbound communications from the Internet (by
definition)
•  Direct attack, no need for “human factor”
•  Remote control becomes easier
•  Attacker identity

§  Land (almost) directly into the data center
•  No need for “lateral movement”

§  Wide outgoing pipe
•  Exfiltration made easier
17

© 2013 Imperva, Inc. All rights reserved.
Means and Opportunity
§  Many code execution / full server takeover vulnerabilities
exist
§  Most are easy to weaponize and exploit
§  In 2013, the following environments were vulnerable to
such attacks
•  ColdFusion
•  Apache Struts
•  vBulletin (TA)
•  Jboss (TA)
•  PHP
http://blog.imperva.com/2013/11/threat-advisory-a-jboss-as-exploit-web-shell-code-injection.html
http://blog.imperva.com/2013/10/threat-advisory-a-vbulletin-exploit-administrator-injection.html
18

© 2013 Imperva, Inc. All rights reserved.
Warning Signs

19

© 2013 Imperva, Inc. All rights reserved.
Warning Signs

20

© 2013 Imperva, Inc. All rights reserved.
2014 Forecast: Server Based APTs
§  We expect more APT operations to happen through
server compromise
§  Such attacks have even a smaller footprint than existing
APT techniques
•  Initial infection
•  Lateral movement
•  Exfiltration

§  Public disclosure will probably arrive 2015

21

© 2013 Imperva, Inc. All rights reserved.
#3 - Ad Networks = Added Risk

22

© 2013 Imperva, Inc. All rights reserved.
Reality Check 1
§  Malware infected PCs = potential income
§  Plenty of ways to monetize (KrebsOnSecurity)

Source: http://krebsonsecurity.com

23

© 2013 Imperva, Inc. All rights reserved.
Reality Check 2
§  Infected mobile devices are even more valuable
§  Can do anything a PC does, therefore can be monetized
the same way
§  Additionally, can send “premium SMS” – a very effective
and direct monetization method

Source: http://thenextweb.com

24

© 2013 Imperva, Inc. All rights reserved.
Black Market Economy 101
§  Infected end points are valuable
§  Therefore, driving traffic for infecting site is valuable
§  Sample price list for geo-location profiled traffic (per
thousand unique visitors; Credit: Webroot blog):

Source: http://webrootblog.files.wordpress.com

25

© 2013 Imperva, Inc. All rights reserved.
Malware + Advertising = Malvertising
§  Paying someone to show
your content is an already
established business
practice
§  It’s called advertising!
§  And when the content is
malicious it’s Malvertising
§  Targeted advertising is very
efficient
§  And so is targeted
malvertising
26

© 2013 Imperva, Inc. All rights reserved.

Source: http://bluebattinghelmet.files.wordpress.com
Malvertising so 2010…

27

© 2013 Imperva, Inc. All rights reserved.
Not!

Source: http://upload.wikimedia.org

28

© 2013 Imperva, Inc. All rights reserved.
Not!

Source: http://upload.wikimedia.org

29

© 2013 Imperva, Inc. All rights reserved.
The Main Door is (Pretty Much) Locked
§  Vendors closely monitor their app shops for malware
§  Result: attackers cannot directly upload malicious apps

30

© 2013 Imperva, Inc. All rights reserved.
2014 Forecast: Year of Mobile Malvertising
§  Dynamic content to already installed apps does not go
through the app shop
§  Supply - mobile app vendors
•  Have many users
•  Do not have a way to monetize on the traffic
•  Eager for advertising revenues

§  Demand – cyber criminals
•  Have malicious content
•  Look for alternative delivery to end users, as market is blocked
•  Eager for traffic

§  Outcome: Mobile Malvertising
31

© 2013 Imperva, Inc. All rights reserved.
BadNews Ad Network Infected Apps

Source: https://blog.lookout.com

32

© 2013 Imperva, Inc. All rights reserved.
The Ad Market is Very Complex
§  Complex environment is a
hotbed for attackers
§  Many opportunities for the
attacker to attack
•  Can choose the weakest link
•  Can move to the next target
when denied

§  App makers have a vast
“deniability region”

33

© 2013 Imperva, Inc. All rights reserved.

Source: http://ad-exchange.fr
#4 - (Finally) Cloud Data Breaches

34

© 2013 Imperva, Inc. All rights reserved.
We are Not in Kansas Anymore Toto!
§  Demand
•  SaaS and DBaaS are becoming mainstream
•  Not early adapters anymore
•  Less technical oriented organizations
•  Test and pilot deployments become production
•  Dial moves from “nice to have” applications to “mission critical”
applications

§  Supply
•  Many new providers
•  Smaller, less experienced organizations
•  Carpe Diem
§  I wanted an app of my own but ended up building a cloud service
35

© 2013 Imperva, Inc. All rights reserved.
Everybody Is Doing It
§  According to Verizon ‘2013 State of the Enterprise Cloud
Report’ (January 2012 – June 2013)
•  The use of cloud-based storage has increased by 90 percent
•  Organizations are now running external-facing and critical
business applications in the cloud – production applications now
account for 60 percent of cloud usage

36

© 2013 Imperva, Inc. All rights reserved.
Hiding in the Fog
§  Outsourcing data MISTAKEN for outsourcing
responsibility
§  Low number of breaches
§  False sense of safety

37

© 2013 Imperva, Inc. All rights reserved.
Ball Waiting for the Player
§  Traditional RDBMS services
•  Used as C&C and dropper infrastructure by cyber criminals
•  Security attitude is not adapted to cloud reality
•  See our “Assessing the Threat Landscape of DBaaS” HII for
more details

§  Big Data services
•  Innovative
•  Smaller providers
•  Using innovative technologies with little to no security built-in
•  Widely adopted by web application startup community, often
storing personal information

38

© 2013 Imperva, Inc. All rights reserved.
Warning Signs and Wakeup Calls

39

© 2013 Imperva, Inc. All rights reserved.
Warning Signs and Wakeup Calls

40

© 2013 Imperva, Inc. All rights reserved.
Warning Signs and Wakeup Calls

41

© 2013 Imperva, Inc. All rights reserved.
Warning Signs and Wakeup Calls

42

© 2013 Imperva, Inc. All rights reserved.
2014 Forecast: Cloud Breaches Increase
§  We expect to see a significant increase in cloud service
data breaches
•  SaaS
•  DBaaS

§  We expect to see a growing use of DBaaS by attackers.
It’s a newcomer to our 2013 ‘Black Cloud on the Horizon’
trend

43

© 2013 Imperva, Inc. All rights reserved.
#5 – Commercial Malware for Data
Centers

44

© 2013 Imperva, Inc. All rights reserved.
Advanced Threat – State Sponsored

Stuxnet

•  Manual
intelligence
•  Advanced
malware attack

Doqu

•  Automatic
intelligence

Rocra
45

© 2013 Imperva, Inc. All rights reserved.

•  Both
•  See
Red October:
The Hunt For
the Data
Growing Criminal Interest

46

© 2013 Imperva, Inc. All rights reserved.
Growing Criminal Interest

47

© 2013 Imperva, Inc. All rights reserved.
Growing Criminal Interest

48

© 2013 Imperva, Inc. All rights reserved.
Commercialization of Military Technologies
§  Advanced threat malware capabilities flow into criminal
malware
•  Technology – modular code, two tier C&C, include data access
and handling code
•  Target – enterprise internals

§  Examples
•  Narilam – destroys business application databases
•  Malware targeting business application (SAP) spotted

49

© 2013 Imperva, Inc. All rights reserved.
Built-in Database Access
§  Our december 2013 HII shows commercial malware
using DBaaS as infrastructure
§  Data store accessing capabilities
§  Mevade – using an integrated services language based on SQL, called
WQL (SQL for Windows Management Interface) to query the target
system's database to learn the security settings.
§  Shylock – SQLlite - Any messages that Skype sends are stored in
Skype's main.db file, which is a standard SQLite database. Shylock
accesses this database and deletes its messages and file transfers so
that the user could not find them in the history.
§  Kulouz – SQLlite to access browser data repositories for sensitive
information, such as credentials
§  Database access malware was used in SK Comms data breach

50

© 2013 Imperva, Inc. All rights reserved.
2014 Forecast: Datacenter is the Goal
§  We are the tipping point and in 2014 we will see active
automated attacks against enterprise data centers
•  Infection methods are more effective than ever
•  Malware infrastructure is mature and ready
•  Criminal use cases are staring to show up

§  We expect business applications to become first class
target for criminals
•  Easier to manipulate
•  The internal version of “web application attacks”

51

© 2013 Imperva, Inc. All rights reserved.
Summary and Conclusion

52

© 2013 Imperva, Inc. All rights reserved.
Summary
§  Our five trends for 2014
•  3rd party vulnerability exploit – bigger, stronger, faster
•  Web server compromise – alternative to APT
•  Ad network infections – more targeted, mobile oriented
•  Cloud breaches – sharp rise in actual incidents
•  Commercial malware – criminals are after your data center

§  Attackers focus their attention on getting into the data
center – physical or virtual
§  Attackers prefer to use the front door (web servers) but at
the same time are constantly improving on the
alternatives (malware and infection methods)
53

© 2013 Imperva, Inc. All rights reserved.
Recommendations
§  Protect your front door protection
•  Web Application Firewalls are not “nice to have”
•  SDLC and patching fail in modern software and threat
environments

§  Improve your internal DATA controls
•  Enhance visibility to data access, both structured and
unstructured
•  Introduce capabilities to detect abusive access to data center
resources

§  Evaluate solutions for your cloud data repositories
•  Perform better due diligence of providers

54

© 2013 Imperva, Inc. All rights reserved.
Bottom Line
§  Balance your security budget to reflect the need for more
data protection over end-point and network perimeter
protection

55

© 2013 Imperva, Inc. All rights reserved.
Webinar Materials
Join Imperva LinkedIn Group,
Imperva Data Security Direct, for…
Post-Webinar
Discussions

Webinar
Recording Link

56

Answers to
Attendee
Questions

Join Group

© 2013 Imperva, Inc. All rights reserved.
www.imperva.com

57

© 2013 Imperva, Inc. All rights reserved.

Contenu connexe

Tendances

Keeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application SecurityKeeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application SecurityKelly Robertson
 
Building secure mobile apps
Building secure mobile appsBuilding secure mobile apps
Building secure mobile appsMartin Vigo
 
Enabling Cloud Smart, Zero-Trust, and TIC
Enabling Cloud Smart, Zero-Trust, and TICEnabling Cloud Smart, Zero-Trust, and TIC
Enabling Cloud Smart, Zero-Trust, and TICAmazon Web Services
 
How to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsHow to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsEnterprise Management Associates
 
Cybersecurity Fundamentals for Bar Associations
Cybersecurity Fundamentals for Bar AssociationsCybersecurity Fundamentals for Bar Associations
Cybersecurity Fundamentals for Bar AssociationsNowSecure
 
Malware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient TruthMalware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient TruthIBM Security
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Designcentralohioissa
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?Rapid7
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsIBM Security
 
Spiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout sessionSpiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout sessionShane Rice
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUlf Mattsson
 
Mobile Application Security Code Reviews
Mobile Application Security Code ReviewsMobile Application Security Code Reviews
Mobile Application Security Code ReviewsDenim Group
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNcentralohioissa
 
Understanding Web Bots and How They Hurt Your Business
Understanding Web Bots and How They Hurt Your BusinessUnderstanding Web Bots and How They Hurt Your Business
Understanding Web Bots and How They Hurt Your BusinessImperva Incapsula
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Managementjustinkallhoff
 
What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?IBM Security
 
Chris Haley - Understanding Attackers' Use of Covert Communications
Chris Haley - Understanding Attackers' Use of Covert CommunicationsChris Haley - Understanding Attackers' Use of Covert Communications
Chris Haley - Understanding Attackers' Use of Covert Communicationscentralohioissa
 
OWASP Mobile Top 10
OWASP Mobile Top 10OWASP Mobile Top 10
OWASP Mobile Top 10NowSecure
 

Tendances (20)

Keeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application SecurityKeeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application Security
 
Building secure mobile apps
Building secure mobile appsBuilding secure mobile apps
Building secure mobile apps
 
Enabling Cloud Smart, Zero-Trust, and TIC
Enabling Cloud Smart, Zero-Trust, and TICEnabling Cloud Smart, Zero-Trust, and TIC
Enabling Cloud Smart, Zero-Trust, and TIC
 
How to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsHow to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-Tools
 
Cybersecurity Fundamentals for Bar Associations
Cybersecurity Fundamentals for Bar AssociationsCybersecurity Fundamentals for Bar Associations
Cybersecurity Fundamentals for Bar Associations
 
Malware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient TruthMalware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient Truth
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Design
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
 
Spiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout sessionSpiceworld 2011 - AppRiver breakout session
Spiceworld 2011 - AppRiver breakout session
 
Advanced persistent threats(APT)
Advanced persistent threats(APT)Advanced persistent threats(APT)
Advanced persistent threats(APT)
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
 
Mobile Application Security Code Reviews
Mobile Application Security Code ReviewsMobile Application Security Code Reviews
Mobile Application Security Code Reviews
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
 
Understanding Web Bots and How They Hurt Your Business
Understanding Web Bots and How They Hurt Your BusinessUnderstanding Web Bots and How They Hurt Your Business
Understanding Web Bots and How They Hurt Your Business
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
OWASP Mobile TOP 10 2014
OWASP Mobile TOP 10 2014OWASP Mobile TOP 10 2014
OWASP Mobile TOP 10 2014
 
What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?
 
Chris Haley - Understanding Attackers' Use of Covert Communications
Chris Haley - Understanding Attackers' Use of Covert CommunicationsChris Haley - Understanding Attackers' Use of Covert Communications
Chris Haley - Understanding Attackers' Use of Covert Communications
 
OWASP Mobile Top 10
OWASP Mobile Top 10OWASP Mobile Top 10
OWASP Mobile Top 10
 

En vedette

Preparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS AttackPreparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS AttackImperva
 
Protect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public CloudProtect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public CloudImperva
 
Anatomy of the Compromised Insider
Anatomy of the Compromised InsiderAnatomy of the Compromised Insider
Anatomy of the Compromised InsiderImperva
 
The Value of Shared Threat Intelligence
The Value of Shared Threat IntelligenceThe Value of Shared Threat Intelligence
The Value of Shared Threat IntelligenceImperva
 
The Anatomy of Comment Spam
The Anatomy of Comment SpamThe Anatomy of Comment Spam
The Anatomy of Comment SpamImperva
 
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
SecureSphere ThreatRadar: Improve Security Team Productivity and FocusSecureSphere ThreatRadar: Improve Security Team Productivity and Focus
SecureSphere ThreatRadar: Improve Security Team Productivity and FocusImperva
 
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known VulnerabilitiesBleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known VulnerabilitiesImperva
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackImperva
 
Is Your Business Safe From Malware And Targeted Attacks
Is Your Business Safe From Malware And Targeted AttacksIs Your Business Safe From Malware And Targeted Attacks
Is Your Business Safe From Malware And Targeted AttacksImperva
 
Web Application Attack Report, Edition #4
Web Application Attack Report, Edition #4Web Application Attack Report, Edition #4
Web Application Attack Report, Edition #4Imperva
 
Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365Imperva
 
6 Most Surprising SharePoint Security Risks
6 Most Surprising SharePoint Security Risks6 Most Surprising SharePoint Security Risks
6 Most Surprising SharePoint Security RisksImperva
 
More databases. More hackers.
More databases. More hackers.More databases. More hackers.
More databases. More hackers.Imperva
 
Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Imperva
 
Stop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their TracksStop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their TracksImperva
 
Man in the Cloud Attacks
Man in the Cloud AttacksMan in the Cloud Attacks
Man in the Cloud AttacksImperva
 
Automation of Web Application Attacks
Automation of Web Application AttacksAutomation of Web Application Attacks
Automation of Web Application AttacksImperva
 
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS AttackAn Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS AttackImperva
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughImperva
 
Web Applications Under Attack: Why Network Security Solutions Leave You Exposed
Web Applications Under Attack: Why Network Security Solutions Leave You ExposedWeb Applications Under Attack: Why Network Security Solutions Leave You Exposed
Web Applications Under Attack: Why Network Security Solutions Leave You ExposedImperva
 

En vedette (20)

Preparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS AttackPreparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS Attack
 
Protect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public CloudProtect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public Cloud
 
Anatomy of the Compromised Insider
Anatomy of the Compromised InsiderAnatomy of the Compromised Insider
Anatomy of the Compromised Insider
 
The Value of Shared Threat Intelligence
The Value of Shared Threat IntelligenceThe Value of Shared Threat Intelligence
The Value of Shared Threat Intelligence
 
The Anatomy of Comment Spam
The Anatomy of Comment SpamThe Anatomy of Comment Spam
The Anatomy of Comment Spam
 
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
SecureSphere ThreatRadar: Improve Security Team Productivity and FocusSecureSphere ThreatRadar: Improve Security Team Productivity and Focus
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
 
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known VulnerabilitiesBleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! Hack
 
Is Your Business Safe From Malware And Targeted Attacks
Is Your Business Safe From Malware And Targeted AttacksIs Your Business Safe From Malware And Targeted Attacks
Is Your Business Safe From Malware And Targeted Attacks
 
Web Application Attack Report, Edition #4
Web Application Attack Report, Edition #4Web Application Attack Report, Edition #4
Web Application Attack Report, Edition #4
 
Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365
 
6 Most Surprising SharePoint Security Risks
6 Most Surprising SharePoint Security Risks6 Most Surprising SharePoint Security Risks
6 Most Surprising SharePoint Security Risks
 
More databases. More hackers.
More databases. More hackers.More databases. More hackers.
More databases. More hackers.
 
Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense
 
Stop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their TracksStop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their Tracks
 
Man in the Cloud Attacks
Man in the Cloud AttacksMan in the Cloud Attacks
Man in the Cloud Attacks
 
Automation of Web Application Attacks
Automation of Web Application AttacksAutomation of Web Application Attacks
Automation of Web Application Attacks
 
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS AttackAn Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t Enough
 
Web Applications Under Attack: Why Network Security Solutions Leave You Exposed
Web Applications Under Attack: Why Network Security Solutions Leave You ExposedWeb Applications Under Attack: Why Network Security Solutions Leave You Exposed
Web Applications Under Attack: Why Network Security Solutions Leave You Exposed
 

Similaire à Top Security Trends for 2014

Hiding in Plain Sight: The Danger of Known Vulnerabilities
Hiding in Plain Sight: The Danger of Known VulnerabilitiesHiding in Plain Sight: The Danger of Known Vulnerabilities
Hiding in Plain Sight: The Danger of Known VulnerabilitiesImperva
 
The Value of Crowd-Sourced Threat Intelligence
The Value of Crowd-Sourced Threat IntelligenceThe Value of Crowd-Sourced Threat Intelligence
The Value of Crowd-Sourced Threat IntelligenceImperva
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
A DevOps Guide to Web Application Security
A DevOps Guide to Web Application SecurityA DevOps Guide to Web Application Security
A DevOps Guide to Web Application SecurityImperva Incapsula
 
Cyber Side-Effects - Cloud Databases and Modern Malware
Cyber Side-Effects - Cloud Databases and Modern MalwareCyber Side-Effects - Cloud Databases and Modern Malware
Cyber Side-Effects - Cloud Databases and Modern MalwareImperva
 
Detect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted AttacksDetect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted AttacksImperva
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackImperva
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutLancope, Inc.
 
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence WebinarEnhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence WebinarAdelaide Hill
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile ApplicationsDenim Group
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsEmulex Corporation
 
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackImperva Incapsula
 
Web Application Hacking 2004
Web Application Hacking 2004Web Application Hacking 2004
Web Application Hacking 2004Mike Spaulding
 
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22Cenzic
 
Solvay secure application layer v2015 seba
Solvay secure application layer v2015   sebaSolvay secure application layer v2015   seba
Solvay secure application layer v2015 sebaSebastien Deleersnyder
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and HackingParth Makadiya
 
Reading the Security Tea Leaves
Reading the Security Tea LeavesReading the Security Tea Leaves
Reading the Security Tea LeavesEd Bellis
 

Similaire à Top Security Trends for 2014 (20)

Hiding in Plain Sight: The Danger of Known Vulnerabilities
Hiding in Plain Sight: The Danger of Known VulnerabilitiesHiding in Plain Sight: The Danger of Known Vulnerabilities
Hiding in Plain Sight: The Danger of Known Vulnerabilities
 
The Value of Crowd-Sourced Threat Intelligence
The Value of Crowd-Sourced Threat IntelligenceThe Value of Crowd-Sourced Threat Intelligence
The Value of Crowd-Sourced Threat Intelligence
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
A DevOps Guide to Web Application Security
A DevOps Guide to Web Application SecurityA DevOps Guide to Web Application Security
A DevOps Guide to Web Application Security
 
Cyber Side-Effects - Cloud Databases and Modern Malware
Cyber Side-Effects - Cloud Databases and Modern MalwareCyber Side-Effects - Cloud Databases and Modern Malware
Cyber Side-Effects - Cloud Databases and Modern Malware
 
Detect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted AttacksDetect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted Attacks
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! Hack
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
 
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence WebinarEnhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile Applications
 
Research Paper
Research PaperResearch Paper
Research Paper
 
Cloud security
Cloud securityCloud security
Cloud security
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
 
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
 
Web Application Hacking 2004
Web Application Hacking 2004Web Application Hacking 2004
Web Application Hacking 2004
 
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
 
Solvay secure application layer v2015 seba
Solvay secure application layer v2015   sebaSolvay secure application layer v2015   seba
Solvay secure application layer v2015 seba
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and Hacking
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Reading the Security Tea Leaves
Reading the Security Tea LeavesReading the Security Tea Leaves
Reading the Security Tea Leaves
 

Plus de Imperva

Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyImperva
 
API Security Survey
API Security SurveyAPI Security Survey
API Security SurveyImperva
 
Imperva ppt
Imperva pptImperva ppt
Imperva pptImperva
 
Beyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountBeyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountImperva
 
Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Imperva
 
Making Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesImperva
 
How We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchImperva
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecurityImperva
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRImperva
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware Imperva
 
7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged VendorsImperva
 
SEO Botnet Sophistication
SEO Botnet SophisticationSEO Botnet Sophistication
SEO Botnet SophisticationImperva
 
Phishing Made Easy
Phishing Made EasyPhishing Made Easy
Phishing Made EasyImperva
 
Imperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva
 
Combat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceCombat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceImperva
 
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyHTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyImperva
 
Get Going With Your GDPR Plan
Get Going With Your GDPR PlanGet Going With Your GDPR Plan
Get Going With Your GDPR PlanImperva
 
Cyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataCyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataImperva
 
Combat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityCombat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityImperva
 
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2: New attacks on the Internet’s Next Generation FoundationHacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2 : New attacks on the Internet’s Next Generation FoundationImperva
 

Plus de Imperva (20)

Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 Survey
 
API Security Survey
API Security SurveyAPI Security Survey
API Security Survey
 
Imperva ppt
Imperva pptImperva ppt
Imperva ppt
 
Beyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountBeyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked account
 
Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds
 
Making Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to Narratives
 
How We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over Lunch
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber Security
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPR
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware
 
7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors
 
SEO Botnet Sophistication
SEO Botnet SophisticationSEO Botnet Sophistication
SEO Botnet Sophistication
 
Phishing Made Easy
Phishing Made EasyPhishing Made Easy
Phishing Made Easy
 
Imperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense Report
 
Combat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceCombat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat Intelligence
 
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyHTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
 
Get Going With Your GDPR Plan
Get Going With Your GDPR PlanGet Going With Your GDPR Plan
Get Going With Your GDPR Plan
 
Cyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataCyber Criminal's Path To Your Data
Cyber Criminal's Path To Your Data
 
Combat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityCombat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data Security
 
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2: New attacks on the Internet’s Next Generation FoundationHacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
 

Dernier

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Dernier (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Top Security Trends for 2014

  • 1. Top Security Trends for 2014 Amichai Shulman, CTO, Imperva 1 © 2013 Imperva, Inc. All rights reserved.
  • 2. Agenda §  Introduction §  2013 forecast scorecard §  2014 security trends §  Summary and conclusion §  Q&A 2 © 2013 Imperva, Inc. All rights reserved.
  • 3. Amichai Shulman – CTO, Imperva §  Speaker at industry events •  RSA, Appsec, Info Security UK, Black Hat §  Lecturer on information security •  Technion - Israel Institute of Technology §  Former security consultant to banks and financial services firms §  Leads the Imperva Application Defense Center (ADC) •  Discovered over 20 commercial application vulnerabilities §  Credited by Oracle, MS-SQL, IBM and others Amichai Shulman one of InfoWorld’s “Top 25 CTOs” 3 © 2013 Imperva, Inc. All rights reserved.
  • 4. 2013 Forecast Scorecard Trend Score 1 C 2 Government  malware  goes  commercial B+ 3 Black  clouds  on  the  horizon B+ 4 Community  policing A 5 4 Hack%vism  gets  process  driven   APT  targets  the  li?le  guy A © 2013 Imperva, Inc. All rights reserved.
  • 5. #1 - 3rd Party is “No Party” 5 © 2013 Imperva, Inc. All rights reserved.
  • 6. Known Vulnerabilities: The Known Knowns §  There are known knowns; these are things we know that we know… •  Donald Rumsfeld, U.S. Secretary of Defense, February 2002 §  3rd Party Known vulnerabilities Vulnerable components (e.g., framework libraries) can be identified and exploited (OWASP: https://www.owasp.org/index.php/Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities) 6 © 2013 Imperva, Inc. All rights reserved.
  • 7. Rich Attack Surface According to Veracode: •  Up to 70% of internally developed code originates outside of the development team •  28% of assessed applications are identified as created by a 3rd party 7 © 2013 Imperva, Inc. All rights reserved.
  • 8. Security Falls Between the Cracks §  Application developers •  Introduce 3rd party code into the system •  Not responsible for 3rd party code security (or quality) •  Not responsible for run-time configuration of 3rd party components §  IT operations •  Not always aware of 3rd party components §  Web server type is more visible than a library •  Reluctant to change configuration settings that might impact application behavior 8 © 2013 Imperva, Inc. All rights reserved.
  • 9. 2014 Forecast: Bigger! Stronger! Faster! §  Bigger! – More Vulnerabilities! §  Stronger! – As a result of the of the vulnerabilities’ market richness, attackers will create vulnerabilities “mash-ups,” combining several different vulnerabilities together §  Faster! – Shorter time from vulnerabilities’ full disclosure to exploits in the wild Source: http://cdn.thinksteroids.com 9 © 2013 Imperva, Inc. All rights reserved.
  • 10. Bigger! Disclosure Rate Increases §  More software + more security researchers + more bounty programs = more vulnerabilities’ disclosures §  CVE IDs Enumeration syntax was changed to track more than 10,000 vulnerabilities in a single year, starting on 2014 10 © 2013 Imperva, Inc. All rights reserved.
  • 11. Stronger! Vulnerabilities “Mash-Up” §  Take several “cheap” (low CVSS impact score) known vulnerabilities •  CVE-2010-3065: PHP §  NIST assigned impact score: 2.9 •  CVE-2011-2505: PHPMyAdmin session modification vulnerability §  NIST assigned impact score: 4.9 §  To create a shining exploit •  PHPMyAdmin full server takeover exploit •  Effective impact score: a perfect 10 §  Read more on Imperva’s HII report: http://www.imperva.com/docs/HII_PHP_SuperGlobals_Supersized_Trouble.pdf 11 © 2013 Imperva, Inc. All rights reserved.
  • 12. Stronger! 1 + 1 = 3 12 © 2013 Imperva, Inc. All rights reserved.
  • 13. Faster! Vulnerability Weaponization §  Since a vulnerability has a limited time span, attackers strive for a faster vulnerability weaponization §  We had witnessed weaponization time cut from weeks to days §  Infrastructure is the key to fast weaponization •  Exploit code is often publicly available •  Dormant botnets are ready to launch the attack •  Command and Control (C2) servers and zombies support §  Dynamic content §  Dynamic targets 13 © 2013 Imperva, Inc. All rights reserved.
  • 14. #2 - Server Based APT Alternative 14 © 2013 Imperva, Inc. All rights reserved.
  • 15. Web Servers Infection is the New Black §  Goals of infecting corporate work stations •  Harness computing resources §  Network bandwidth to be used in DDoS attacks §  CPU power to mine Bitcoins •  Use as a bridgehead into the corporate datacenter §  Both goals are better achieved by targeting web servers •  More powerful •  Inherently connected to the corporate datacenter 15 © 2013 Imperva, Inc. All rights reserved.
  • 16. Traditional Infiltration Attack 16 © 2013 Imperva, Inc. All rights reserved.
  • 17. Why Start with Web Servers? §  Easier reconnaissance •  Detect type and components, discover vulnerabilities §  Accept inbound communications from the Internet (by definition) •  Direct attack, no need for “human factor” •  Remote control becomes easier •  Attacker identity §  Land (almost) directly into the data center •  No need for “lateral movement” §  Wide outgoing pipe •  Exfiltration made easier 17 © 2013 Imperva, Inc. All rights reserved.
  • 18. Means and Opportunity §  Many code execution / full server takeover vulnerabilities exist §  Most are easy to weaponize and exploit §  In 2013, the following environments were vulnerable to such attacks •  ColdFusion •  Apache Struts •  vBulletin (TA) •  Jboss (TA) •  PHP http://blog.imperva.com/2013/11/threat-advisory-a-jboss-as-exploit-web-shell-code-injection.html http://blog.imperva.com/2013/10/threat-advisory-a-vbulletin-exploit-administrator-injection.html 18 © 2013 Imperva, Inc. All rights reserved.
  • 19. Warning Signs 19 © 2013 Imperva, Inc. All rights reserved.
  • 20. Warning Signs 20 © 2013 Imperva, Inc. All rights reserved.
  • 21. 2014 Forecast: Server Based APTs §  We expect more APT operations to happen through server compromise §  Such attacks have even a smaller footprint than existing APT techniques •  Initial infection •  Lateral movement •  Exfiltration §  Public disclosure will probably arrive 2015 21 © 2013 Imperva, Inc. All rights reserved.
  • 22. #3 - Ad Networks = Added Risk 22 © 2013 Imperva, Inc. All rights reserved.
  • 23. Reality Check 1 §  Malware infected PCs = potential income §  Plenty of ways to monetize (KrebsOnSecurity) Source: http://krebsonsecurity.com 23 © 2013 Imperva, Inc. All rights reserved.
  • 24. Reality Check 2 §  Infected mobile devices are even more valuable §  Can do anything a PC does, therefore can be monetized the same way §  Additionally, can send “premium SMS” – a very effective and direct monetization method Source: http://thenextweb.com 24 © 2013 Imperva, Inc. All rights reserved.
  • 25. Black Market Economy 101 §  Infected end points are valuable §  Therefore, driving traffic for infecting site is valuable §  Sample price list for geo-location profiled traffic (per thousand unique visitors; Credit: Webroot blog): Source: http://webrootblog.files.wordpress.com 25 © 2013 Imperva, Inc. All rights reserved.
  • 26. Malware + Advertising = Malvertising §  Paying someone to show your content is an already established business practice §  It’s called advertising! §  And when the content is malicious it’s Malvertising §  Targeted advertising is very efficient §  And so is targeted malvertising 26 © 2013 Imperva, Inc. All rights reserved. Source: http://bluebattinghelmet.files.wordpress.com
  • 27. Malvertising so 2010… 27 © 2013 Imperva, Inc. All rights reserved.
  • 28. Not! Source: http://upload.wikimedia.org 28 © 2013 Imperva, Inc. All rights reserved.
  • 29. Not! Source: http://upload.wikimedia.org 29 © 2013 Imperva, Inc. All rights reserved.
  • 30. The Main Door is (Pretty Much) Locked §  Vendors closely monitor their app shops for malware §  Result: attackers cannot directly upload malicious apps 30 © 2013 Imperva, Inc. All rights reserved.
  • 31. 2014 Forecast: Year of Mobile Malvertising §  Dynamic content to already installed apps does not go through the app shop §  Supply - mobile app vendors •  Have many users •  Do not have a way to monetize on the traffic •  Eager for advertising revenues §  Demand – cyber criminals •  Have malicious content •  Look for alternative delivery to end users, as market is blocked •  Eager for traffic §  Outcome: Mobile Malvertising 31 © 2013 Imperva, Inc. All rights reserved.
  • 32. BadNews Ad Network Infected Apps Source: https://blog.lookout.com 32 © 2013 Imperva, Inc. All rights reserved.
  • 33. The Ad Market is Very Complex §  Complex environment is a hotbed for attackers §  Many opportunities for the attacker to attack •  Can choose the weakest link •  Can move to the next target when denied §  App makers have a vast “deniability region” 33 © 2013 Imperva, Inc. All rights reserved. Source: http://ad-exchange.fr
  • 34. #4 - (Finally) Cloud Data Breaches 34 © 2013 Imperva, Inc. All rights reserved.
  • 35. We are Not in Kansas Anymore Toto! §  Demand •  SaaS and DBaaS are becoming mainstream •  Not early adapters anymore •  Less technical oriented organizations •  Test and pilot deployments become production •  Dial moves from “nice to have” applications to “mission critical” applications §  Supply •  Many new providers •  Smaller, less experienced organizations •  Carpe Diem §  I wanted an app of my own but ended up building a cloud service 35 © 2013 Imperva, Inc. All rights reserved.
  • 36. Everybody Is Doing It §  According to Verizon ‘2013 State of the Enterprise Cloud Report’ (January 2012 – June 2013) •  The use of cloud-based storage has increased by 90 percent •  Organizations are now running external-facing and critical business applications in the cloud – production applications now account for 60 percent of cloud usage 36 © 2013 Imperva, Inc. All rights reserved.
  • 37. Hiding in the Fog §  Outsourcing data MISTAKEN for outsourcing responsibility §  Low number of breaches §  False sense of safety 37 © 2013 Imperva, Inc. All rights reserved.
  • 38. Ball Waiting for the Player §  Traditional RDBMS services •  Used as C&C and dropper infrastructure by cyber criminals •  Security attitude is not adapted to cloud reality •  See our “Assessing the Threat Landscape of DBaaS” HII for more details §  Big Data services •  Innovative •  Smaller providers •  Using innovative technologies with little to no security built-in •  Widely adopted by web application startup community, often storing personal information 38 © 2013 Imperva, Inc. All rights reserved.
  • 39. Warning Signs and Wakeup Calls 39 © 2013 Imperva, Inc. All rights reserved.
  • 40. Warning Signs and Wakeup Calls 40 © 2013 Imperva, Inc. All rights reserved.
  • 41. Warning Signs and Wakeup Calls 41 © 2013 Imperva, Inc. All rights reserved.
  • 42. Warning Signs and Wakeup Calls 42 © 2013 Imperva, Inc. All rights reserved.
  • 43. 2014 Forecast: Cloud Breaches Increase §  We expect to see a significant increase in cloud service data breaches •  SaaS •  DBaaS §  We expect to see a growing use of DBaaS by attackers. It’s a newcomer to our 2013 ‘Black Cloud on the Horizon’ trend 43 © 2013 Imperva, Inc. All rights reserved.
  • 44. #5 – Commercial Malware for Data Centers 44 © 2013 Imperva, Inc. All rights reserved.
  • 45. Advanced Threat – State Sponsored Stuxnet •  Manual intelligence •  Advanced malware attack Doqu •  Automatic intelligence Rocra 45 © 2013 Imperva, Inc. All rights reserved. •  Both •  See Red October: The Hunt For the Data
  • 46. Growing Criminal Interest 46 © 2013 Imperva, Inc. All rights reserved.
  • 47. Growing Criminal Interest 47 © 2013 Imperva, Inc. All rights reserved.
  • 48. Growing Criminal Interest 48 © 2013 Imperva, Inc. All rights reserved.
  • 49. Commercialization of Military Technologies §  Advanced threat malware capabilities flow into criminal malware •  Technology – modular code, two tier C&C, include data access and handling code •  Target – enterprise internals §  Examples •  Narilam – destroys business application databases •  Malware targeting business application (SAP) spotted 49 © 2013 Imperva, Inc. All rights reserved.
  • 50. Built-in Database Access §  Our december 2013 HII shows commercial malware using DBaaS as infrastructure §  Data store accessing capabilities §  Mevade – using an integrated services language based on SQL, called WQL (SQL for Windows Management Interface) to query the target system's database to learn the security settings. §  Shylock – SQLlite - Any messages that Skype sends are stored in Skype's main.db file, which is a standard SQLite database. Shylock accesses this database and deletes its messages and file transfers so that the user could not find them in the history. §  Kulouz – SQLlite to access browser data repositories for sensitive information, such as credentials §  Database access malware was used in SK Comms data breach 50 © 2013 Imperva, Inc. All rights reserved.
  • 51. 2014 Forecast: Datacenter is the Goal §  We are the tipping point and in 2014 we will see active automated attacks against enterprise data centers •  Infection methods are more effective than ever •  Malware infrastructure is mature and ready •  Criminal use cases are staring to show up §  We expect business applications to become first class target for criminals •  Easier to manipulate •  The internal version of “web application attacks” 51 © 2013 Imperva, Inc. All rights reserved.
  • 52. Summary and Conclusion 52 © 2013 Imperva, Inc. All rights reserved.
  • 53. Summary §  Our five trends for 2014 •  3rd party vulnerability exploit – bigger, stronger, faster •  Web server compromise – alternative to APT •  Ad network infections – more targeted, mobile oriented •  Cloud breaches – sharp rise in actual incidents •  Commercial malware – criminals are after your data center §  Attackers focus their attention on getting into the data center – physical or virtual §  Attackers prefer to use the front door (web servers) but at the same time are constantly improving on the alternatives (malware and infection methods) 53 © 2013 Imperva, Inc. All rights reserved.
  • 54. Recommendations §  Protect your front door protection •  Web Application Firewalls are not “nice to have” •  SDLC and patching fail in modern software and threat environments §  Improve your internal DATA controls •  Enhance visibility to data access, both structured and unstructured •  Introduce capabilities to detect abusive access to data center resources §  Evaluate solutions for your cloud data repositories •  Perform better due diligence of providers 54 © 2013 Imperva, Inc. All rights reserved.
  • 55. Bottom Line §  Balance your security budget to reflect the need for more data protection over end-point and network perimeter protection 55 © 2013 Imperva, Inc. All rights reserved.
  • 56. Webinar Materials Join Imperva LinkedIn Group, Imperva Data Security Direct, for… Post-Webinar Discussions Webinar Recording Link 56 Answers to Attendee Questions Join Group © 2013 Imperva, Inc. All rights reserved.
  • 57. www.imperva.com 57 © 2013 Imperva, Inc. All rights reserved.