SUBSCRIBE | EXPAND | HOME | QUARTERLY

Posted Thursday October 3, 2019


___________________________
Cyber Threat

New Threat Intelligence Spotlight Report on the Shifting Framework of Modern Malware

Research reveals how evolving threats can readily bypass legacy antivirus solutions

Waterloo - eSentire, Inc. and Carbon Black announced the release of a new Threat Intelligence Spotlight that highlights the increasing sophistication of modern malware. The new report coincides with the start of National Cybersecurity Awareness Month in the United States and Canada.

With modern malware becoming increasingly sophisticated, eSentire and Carbon Black conducted the Threat Intelligence Spotlight to provide a resource that can be used by anyone, regardless of their technical knowledge, to understand how malware works, and more importantly how to protect against its impact.

eSentire's Threat Intelligence Spotlight: The Shifting Framework of Modern Malware draws on data gathered from both Carbon Black's extensive endpoint protection install base and the more than 650 mid-sized organizations that eSentire protects. Analysis of this data by security analysts at both companies reveals interesting findings, which include:

• The median number of variants within a malware family is around 10, which begins to highlight the challenges faced by traditional endpoint solutions—and the largest number of variants within a family is more than 200

• It takes nearly 40 hours for the majority of legacy antivirus engines to detect some new forms of malware

• New variants of Emotet, a major malware family that recently returned after a four month hiatus, can spread to unprotected hosts on the same network in under 12 seconds

• Over two-thirds (67%) of all malware enters an organization via email

Sean Blenkhorn, Chief Product Officer, eSentire said: "The global malware ecosystem has matured beyond nuisance-causing and attention-grabbing activities into a massive business, complete with markets, vendors and outsourcing. Education is the first step in being able to protect against malware, and our new Threat Intelligence Spotlight provides the perfect foundation for anyone who wants to understand this issue in more detail."

Tom Kellermann, Chief Cybersecurity Officer, Carbon Black said: "As attackers continue to evolve their techniques, visibility for defenders is absolutely paramount. Legacy antivirus solutions are proficient at one thing – stopping known commodity malware. As any security professional will tell you, commodity malware represents only a small fraction of today's attacks. Modern attacks are often fileless, aim to gain persistence on the enterprise and often allow the attacker to move laterally. Modern endpoint protection is required for stopping modern attacks."










exchangemagazine.com is distributed twice weekly; Tuesday and Thursday


Not a Subscriber? Receive more articles on business issues
Sent directly to your email in-box.


contact us

Publisher is Exchange Business Communication Inc.
No part of this article may be reproduced without written permission from the publisher.
Email Publisher

ISSN 0824-45
Copyright, 2019

Share Your Story: pressrelease @ exchangemagazine.com
Expand Your Reach:
advertise @ exchangemagazine.com
Publisher: Exchange Business Communication Inc., PO Box 248, Waterloo, Ontario, Canada
Email Editor

Content published on this site represents the opinion of the individual, organization and/or source provider. Exchangemagazine.com is a online daily journal of Exchange Business Communication Inc. (1997) Publishers of Exchange Magazine est. 1983. Privacy Policy. Copyright of Exchange produced editorial is the copyright of Exchange Business Communications Inc. 2019. Submitted editorials, comments and releases are copyright of respective source(s).