TMCnet News
Red Canary's Threat Detection Report Reveals Top Threats and Techniques Used by CybercriminalsNew research analyzed 40,000 threats in customer environments to uncover the most impactful trends, threats, and techniques Findings showed a notable increase in cloud and identity-specific techniques Eight out of the top 10 threats are regularly observed during early stages of ransomware intrusions DENVER, March 23, 2023 /PRNewswire/ -- Red Canary, a leader in managed detection and response, today unveiled its fifth annual Threat Detection Report. This in-depth report is based on analysis of approximately 40,000 threats identified in 250 petabytes of telemetry collected from the company's customers' cloud workloads, identities, SaaS applications, networks, and endpoints over the past year. This research highlights the trends Red Canary's experts observed as adversaries continue to organize, commoditize, and scale their cybercriminal operations. It also includes an examination of the techniques and tools that adversaries rely on most often when they conduct cyber attacks. "Our aim with this report is to provide everyone from executives to practitioners with a comprehensive view of the threat landscape, including new twists on existing adversary tradecraft," said Keith McCammon, co-founder and Chief Security Officer at Red Canary. "The Threat Detection Report offers unique data and insights, accompanied by recommended actions. From taking back control of the attack surface to how to monitor for attacks targeting cloud-based infrastructure and applications, we hope this report provides organizations with what they need to effectively detect and respond to cybersecurity threats." Red Canary's visibility into organizations' technology environments has continued to expand in breadth and depth. An increase in data sources for the Threat Detection Report over the past year has shed light on new trends, threats, and techniques, including: Trends
Techniques
The full report is intended as a reference library for security practitioners to improve their ability to prevent, mitigate, detect, and emulate cyber threats. It offers detailed guidance on data sources that log relevant evidence of adversary behaviors, tools that collect from those data sources, how security teams can use this visibility to develop detection coverage, and much more deeply actionable information. Learn more
Methodology Each of the nearly 40,000 threats were not prevented by the customers' expansive security controls. They are the product of a breadth and depth that Red Canary leverages to detect the threats that would otherwise go undetected. About Red Canary View original content to download multimedia:https://www.prnewswire.com/news-releases/red-canarys-threat-detection-report-reveals-top-threats-and-techniques-used-by-cybercriminals-301779534.html SOURCE Red Canary |