Category Archives: Whitepaper

How to use emerging technology in the fight against cybercrime

How to use technology in the fight against cybercrime

The digital transformation brings with it a litany of advantages and opportunities for all kinds of organizations, from an increase in productivity and efficiency, to larger markets in which to operate.

But these advantages and the breaking down of barriers for the sake of increased globalization go hand in hand with some drawbacks, one of which is the incredible increase in the amount of cyberattacks carried out. We need look no further than last year, when there were almost double the amount of cybersecurity incidents in companies compared to the previous year. What’s more, there were around 159,000 data breaches driven by ransomware or new attack methods. And the economic consequences of these incidents are staggering: the global cost of cybercrime is expected to exceed $2 trillion by 2019.

It is clear that in order to tackle figures like these, it is necessary to invest in qualified professionals. However, with the increase in the scale and sophistication of attacks, the development of cybersecurity professionals has been outstripped by the growth and the sophistication of cyberthreats.

In this context, it is clear that there is a lack of cybersecurity professionals; in fact, 22% of organizations report that their cybersecurity teams are not large enough to take on everything that is required of them. The Information System Security Certification Consortium, or (ISC)2, estimates there to be a skills gap of just under 3 million professionals.

Download the whitepaper

Addressing the shortage with technology

The boom of the Internet of things (IoT) means that there are ever more data points to track and more points of entry into systems. The use of machine learning and artificial intelligence (AI) can help address this problem, and at the same time mitigate the skills gap. These technologies can gather and analyze data, trace threats, search for vulnerabilities, respond to breaches, and thus reduce the IT team’s workload. At Panda Security, we make this technology a reality with our Threat Hunting and Investigation service, which allows the automatic classification of 99.98% of threats, leaving just 0.02% of them to analysts. This way we can focus on the really dangerous attacks.

Some of the advantages that technology can bring to our organizations are:

Prevention. With AI, systems can be developed to search for security flaws and deploy solutions in real time.

Detection. AI can help cybersecurity analysts to detect and analyze high risks incidents, and to investigate threats.

Response. Machine learning and artificial intelligence can segregate networks to isolate assets or to redirect attackers away from vulnerabilities or valuable data.

Choosing the right cybersecurity solution for my company: what does it need to have?

Panda Security leverages a combination of solutions and services for their customers to provide visibility of all endpoint activity, control of all running processes, and to reduce the attack surface. This includes device management and control features, EDR and EPP solutions, 100% Classification and Threat Hunting services, all the data gathered by its Collective Intelligence for more than 28 years, and external IOAs and IOCs, all perfectly synchronized. These advantages are grouped together on the security platform, Panda Adaptive Defense.

The Cybersecurity Tech Accord – the key accord in the interest of defending equitable, global cybersecurity of which Panda Security has been a member since last year – has prepared a whitepaper, “Addressing the Cybersecurity Skills Gap through Cooperation, Education and Emerging Technologies”. In it, you can discover what challenges the skills gap presents, what initiatives have been proposed to resolve it, and more details on how emerging technology can put a stop to this problem.

Download the whitepaper

The post How to use emerging technology in the fight against cybercrime appeared first on Panda Security Mediacenter.

Patches and data control: Keys to your organization’s security

emotet whitepaper patches

November 2018, Chile. The bank Consorcio de Chile discovers that it has become the victim of an advanced cyberattack, a dangerous and undesirable situation for any company. If we add to this the fact that the attack involved the Trojan known as the nightmare of global banking, and the fact that this particular nightmare managed to steal 2 million dollars from the bank’s funds, the outlook is extremely disheartening.

Download the Whitepaper

Analysis of EMOTET

The Trojan in question is called Emotet, and Chile is just the latest country on its list of victims—a list that already includes countries such as Germany, Switzerland and the United States. But what is Emotet, how does it spread, and what damage can it do?

Emotet is a polymorphic banking Trojan. Its main goal is to steal data such as user credentials, or to spy on network traffic. It is also frequently used to download other malware, including other banking Trojans.

The most common propagation method for this Trojan is email, whether via infected attachments or embedded URLs. One particularly dangerous feature of Emotet is that it takes over its victims’ email accounts. This helps to trick other users into downloading the Trojan onto their systems.

Emotet graphic

Once Emotet has infected a computer on a network, it uses the vulnerability EternalBlue to get to other endpoints on unpatched systems.

The most serious damage

The most serious consequences that an organization can experience as a result of an EMOTET attack include:

-Theft of personally identifiable information (PII).

-Leaking of financial and confidential information, which can be used for blackmail.

Theft of login credentials, making other accounts vulnerable

Long remediation periods for network administrators.

Loss of productivity of employees whose endpoints have to be isolated from the network

It is clear that this malware would be a serious danger for any company it managed to infiltrate. This is why at Panda Security, we recommend having the best preventative protection against any kind of malware, both known and unknown. This is what Panda Adaptive Defense does, since it stops all malware from running, as well as keeping endpoints updated.

In our whitepaper, Patches and data control: Keys to your organization’s security, you can find more information about the risks that this Trojan can entail, how it can get into your company, and how Panda can help you to avoid the most drastic damages.

Download the Whitepaper

The post Patches and data control: Keys to your organization’s security appeared first on Panda Security Mediacenter.