Intelligent CISO Issue 02 | Page 77

decrypting myths

SANS experts share five most dangerous new cyberattack techniques

Cyberattacks are not only increasing in frequency , but also in alarmingly sophisticated new ways . It means businesses are left struggling to keep track of the constantly evolving threat landscape . On hand to help are the cybersecurity experts from SANS , who have outlined what they say are the five most dangerous new cyberattack techniques of which organisations need to be aware . ybersecurity

C experts from SANS – a leading provider of cybersecurity training and certification to professionals at governments and commercial institutions world-wide – have presented the five most dangerous new cyberattack techniques . They outlined the threats in their annual RSA keynote session in San Francisco and shared their views on how they work , how they can be stopped , or at least slowed , and how businesses and consumers can prepare . The five threats outlined are :

• repositories and cloud storage data leakage
• big data analytics , de-anonymisation and correlation
• attackers monetise compromised systems using cryptocoin miners
• recognition of hardware flaws
• more malware and attacks disrupting ICS and utilities instead of seeking profit
Repositories and cloud storage data leakage
Ed Skoudis , a top hacker exploits expert , SANS faculty fellow and lead for the SANS Penetration Testing Curriculum , talked about the data leakage threats facing organisations from the increased use of repositories and cloud storage .
He said : “ Software today is built in a very different way than it was 10 or even five years ago , with vast online code repositories for collaboration and cloud data storage hosting missioncritical applications . However , attackers are increasingly targeting these kinds of repositories and cloud storage infrastructures , looking for passwords , crypto keys , access tokens and terabytes of sensitive data . Defenders need to focus on data inventories , appointing a data curator for their organisation and educating system architects and developers about how to secure data assets in the cloud .
“ Additionally , the big cloud companies have each launched an AI service to www . intelligentciso . com | Issue 02
77