{"id":117,"date":"2023-09-03T00:42:55","date_gmt":"2023-09-03T00:42:55","guid":{"rendered":"http:\/\/improdango.com\/?page_id=117"},"modified":"2023-09-07T05:02:44","modified_gmt":"2023-09-07T05:02:44","slug":"threat-trends","status":"publish","type":"page","link":"http:\/\/improdango.com\/?page_id=117","title":{"rendered":"Threat Trends"},"content":{"rendered":"\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<p><a href=\"http:\/\/improdango.com\/?page_id=14\" data-type=\"page\" data-id=\"14\">&#x2196; Industry Background<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<p><a href=\"http:\/\/improdango.com\/?page_id=16\" data-type=\"page\" data-id=\"16\">Threat Modeling &#x2197;<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-vertically-aligned-center\" style=\"grid-template-columns:35% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/improdango.com\/wp-content\/uploads\/2023\/09\/AdobeStock_298595791-1024x1024.png\" alt=\"\" class=\"wp-image-137 size-medium\" srcset=\"http:\/\/improdango.com\/wp-content\/uploads\/2023\/09\/AdobeStock_298595791-1024x1024.png 1024w, http:\/\/improdango.com\/wp-content\/uploads\/2023\/09\/AdobeStock_298595791-300x300.png 300w, http:\/\/improdango.com\/wp-content\/uploads\/2023\/09\/AdobeStock_298595791-150x150.png 150w, http:\/\/improdango.com\/wp-content\/uploads\/2023\/09\/AdobeStock_298595791-768x768.png 768w, http:\/\/improdango.com\/wp-content\/uploads\/2023\/09\/AdobeStock_298595791.png 1055w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<h4 class=\"wp-block-heading\">Social Engineering &amp; Sector Culture<\/h4>\n\n\n\n<p>Behavioral techniques are used to trick people to provide sensitive information.<\/p>\n\n\n\n<p>\u2022According to IBM\u2019s 2019 X-Force Threat Intelligence Index, 29% of attacks involved phishing emails. The primary targets are accounts of senior banking members (SwivelSecure).&nbsp;<\/p>\n\n\n\n<p>\u2022These phishing attacks are the #1 attack in the banking sector as once inside attackers can use APT to harvest personal\/financial data (Naz).<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile is-vertically-aligned-center\" style=\"grid-template-columns:auto 40%\"><div class=\"wp-block-media-text__content\">\n<h4 class=\"wp-block-heading\"><strong>Exploited Vulnerabilities&nbsp;<\/strong><\/h4>\n\n\n\n<p>Increase in hybrid workforce and cloud based have increased network vulnerabilities.<\/p>\n\n\n\n<p>&nbsp;As per Mimecast, 56% of infected systems are due to the inability to patch \u201czero-day\u201d threats.<\/p>\n\n\n\n<p>Positive Technologies, a company that has a commercial stake in securing web apps, found that banking institutions were \u201cthe most vulnerable\u201d to getting hacked as of 2018. (Whittaker)<\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1320\" height=\"821\" src=\"http:\/\/improdango.com\/wp-content\/uploads\/2023\/09\/AdobeStock_134821701.png\" alt=\"\" class=\"wp-image-132 size-full\" srcset=\"http:\/\/improdango.com\/wp-content\/uploads\/2023\/09\/AdobeStock_134821701.png 1320w, http:\/\/improdango.com\/wp-content\/uploads\/2023\/09\/AdobeStock_134821701-300x187.png 300w, http:\/\/improdango.com\/wp-content\/uploads\/2023\/09\/AdobeStock_134821701-1024x637.png 1024w, http:\/\/improdango.com\/wp-content\/uploads\/2023\/09\/AdobeStock_134821701-768x478.png 768w\" sizes=\"auto, (max-width: 1320px) 100vw, 1320px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-vertically-aligned-bottom\" style=\"grid-template-columns:40% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"678\" src=\"http:\/\/improdango.com\/wp-content\/uploads\/2023\/09\/AdobeStock_152829351-1024x678.png\" alt=\"\" class=\"wp-image-133 size-full\" srcset=\"http:\/\/improdango.com\/wp-content\/uploads\/2023\/09\/AdobeStock_152829351-1024x678.png 1024w, http:\/\/improdango.com\/wp-content\/uploads\/2023\/09\/AdobeStock_152829351-300x199.png 300w, http:\/\/improdango.com\/wp-content\/uploads\/2023\/09\/AdobeStock_152829351-768x509.png 768w, http:\/\/improdango.com\/wp-content\/uploads\/2023\/09\/AdobeStock_152829351.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<h4 class=\"wp-block-heading\"><strong>Ransomware<\/strong><\/h4>\n\n\n\n<p>Data encrypted by attackers has become more frequent and a major headache to most companies.<\/p>\n\n\n\n<p>According to a Sophos 2023 report, 64% of institutions reported being hit by ransomware vs 36% across all sectors.<\/p>\n\n\n\n<p>Concerningly only 14% of the encryption attacks were stopped prior to having data encrypted.<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"has-text-align-right\"><a href=\"http:\/\/improdango.com\/?page_id=16\" data-type=\"page\" data-id=\"16\">Threat Modeling &#x2197;<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#x2196; Industry Background Threat Modeling &#x2197; Social Engineering &amp; Sector Culture Behavioral techniques are used to trick people to provide sensitive information. \u2022According to IBM\u2019s 2019 X-Force Threat Intelligence Index, 29% of attacks involved phishing emails. The primary targets are accounts of senior banking members (SwivelSecure).&nbsp; \u2022These phishing attacks are the #1 attack in the [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":14,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-117","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"http:\/\/improdango.com\/index.php?rest_route=\/wp\/v2\/pages\/117","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/improdango.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/improdango.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/improdango.com\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/improdango.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=117"}],"version-history":[{"count":12,"href":"http:\/\/improdango.com\/index.php?rest_route=\/wp\/v2\/pages\/117\/revisions"}],"predecessor-version":[{"id":186,"href":"http:\/\/improdango.com\/index.php?rest_route=\/wp\/v2\/pages\/117\/revisions\/186"}],"up":[{"embeddable":true,"href":"http:\/\/improdango.com\/index.php?rest_route=\/wp\/v2\/pages\/14"}],"wp:attachment":[{"href":"http:\/\/improdango.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}