|
Symantec Intelligence Report May 2015 |
Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Présentation : Twitter Card Style summary Welcome to the May edition of the Symantec Intelligence report. Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam, and other potentially harmful business risks. It appears as though attackers had small businesses clearly in their sights last month. All of our metrics that look at the size of organizations show businesses with less than 250 employees were subjected to the largest amount of malicious activity during the month of May. For instance, 42.5 percent of spear-phishing attacks were directed at organizations of this size during May, up from 30.6 percent in April. Small organizations were the most targeted size for overall phishing too. And while all organization sizes hovered around a 52 percent spam rate, organizations with less than 250 employees had the highest rate at 52.7 percent. Small organizations were most likely to be targeted by malicious email in the month of May as well, where one in 141 emails contained a threat. The overall proportion of email traffic containing malware also increased this month, up from one in 246 emails in April to one in 207 emails in May. However the percentage of email malware that contained a URL remained low in May, hovering around three percent. The Public Administration sector was the most targeted industry again in May, with one in 150 emails containing malware, though this is down from one in 127 in April. In spear-phishing attacks, Microsoft Word files the .doc and .docx extensions made up over 40 percent of attachments used in spear-phishing attacks during May. Microsoft Excel files also ranked highly, comprising 13.5 percent of spear-phishing attachments. While executable files, such as .bin, .exe, and .scr files, are frequently seen in spear-phishing attacks, this category of file types was down almost 25 percentage points in May. The Manufacturing sector was subjected to the largest volume of spear-phishing attacks, as 41 percent were directed at organizations in this sector. In other news, there were more than 44.5 million new malware variants created in May, one zero-day vulnerability was reported CVE-2015-3456 , and while two vulnerabilities in industrial control systems were reported in April, none were reported this May. We hope you enjoy the May Symantec Intelligence Report. You can download your copy here.
Les mots clés de la revue de presse pour cet article : symantec intelligence Les videos sur SecuObs pour les mots clés : symantec intelligence Les mots clés pour les articles publiés sur SecuObs : symantec Les éléments de la revue Twitter pour les mots clé : symantec
Les derniers articles du site "Symantec Connect Symantec Intelligence Billets" :
- Symantec Intelligence Report November 2015 - Symantec Intelligence Report October 2015 - Symantec Intelligence Report September 2015 - Symantec Intelligence Report August 2015 - Symantec Intelligence Report July 2015 - Symantec Intelligence Report June 2015 - Symantec Intelligence Report May 2015 - Symantec Intelligence Report February 2015 - Symantec Intelligence Report January 2015 - Symantec Intelligence Report December 2014
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.190.17.190 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.190.17.190 to any 80"
- Nous contacter par mail
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|