{"id":1780,"date":"2017-01-24T09:42:46","date_gmt":"2017-01-24T01:42:46","guid":{"rendered":"http:\/\/people.utm.my\/hazinah\/?p=1780"},"modified":"2017-01-24T10:18:56","modified_gmt":"2017-01-24T02:18:56","slug":"cyber-threat-intelligence-shows-majority-of-cybercrime-is-not-sophisticated","status":"publish","type":"post","link":"https:\/\/people.utm.my\/hazinah\/2017\/01\/cyber-threat-intelligence-shows-majority-of-cybercrime-is-not-sophisticated\/","title":{"rendered":"Cyber Threat Intelligence Shows Majority of Cybercrime is NOT Sophisticated"},"content":{"rendered":"<p>Adam Meyer is the Chief Security Strategist at SurfWatch Labs. In <a href=\"http:\/\/www.securityweek.com\/cyber-threat-intelligence-shows-majority-cybercrime-not-sophisticated\" target=\"_blank\">his article in SecurityWeek<\/a> with the same title as this post, he stated that;<\/p>\n<blockquote><p><span style=\"color: #0000ff\"><span style=\"font-family: 'trebuchet ms', geneva;font-size: medium\">&#8230;.but if you look at all of the cybercrime activity from the past year, it\u2019s clear that the <em>majority of threats do not have the level of sophistication<\/em> that is often talked about.<\/span><span style=\"font-family: 'trebuchet ms', geneva;font-size: medium\">\u00a0<\/span><\/span><\/p>\n<p><span style=\"color: #0000ff;font-family: 'trebuchet ms', geneva;font-size: medium\">Rather, what cyber threat intelligence is showing us is that most threats simply exploit a series of well-documented vulnerabilities and other weak points to move along the path of least resistance \u2013 and the most profit.\u00a0<\/span><\/p><\/blockquote>\n<p><span style=\"color: #333333;font-family: 'trebuchet ms', geneva;font-size: medium\">Interestingly, this is a pointer for us to acknowledge that just because things CAN get sophisticated, it does not mean the &#8216;<em>oldies<\/em>&#8216; cannot still churn out &#8216;<em>nasties<\/em>&#8216;. He went to list Ransomware, Exploit Kits, Credentials Management and Extortion as some of the top threats out there today.\u00a0<\/span><\/p>\n<p><span style=\"color: #333333;font-family: 'trebuchet ms', geneva;font-size: medium\">*Note: there is a jargon he used in the article that some readers can be a little befuddled. I give you the meaning here for your reference.<\/span><\/p>\n<p><a href=\"https:\/\/people.utm.my\/hazinah\/2017\/01\/24\/cyber-threat-intelligence-shows-majority-of-cybercrime-is-not-sophisticated\/fud-meaning\/\" rel=\"attachment wp-att-1784\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1784\" src=\"https:\/\/people.utm.my\/hazinah\/wp-content\/uploads\/sites\/709\/2017\/01\/FUD-meaning.jpg\" alt=\"FUD meaning\" width=\"607\" height=\"169\" srcset=\"https:\/\/people.utm.my\/hazinah\/wp-content\/uploads\/sites\/709\/2017\/01\/FUD-meaning.jpg 607w, https:\/\/people.utm.my\/hazinah\/wp-content\/uploads\/sites\/709\/2017\/01\/FUD-meaning-300x84.jpg 300w\" sizes=\"(max-width: 607px) 100vw, 607px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Adam Meyer is the Chief Security Strategist at SurfWatch Labs. In his article in SecurityWeek with the same title as this post, he stated that; &#8230;.but if you look at all of the cybercrime activity from the past year, it\u2019s clear that the majority of threats do not have the level of sophistication that is [&hellip;]<\/p>\n","protected":false},"author":619,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[23,88,1],"tags":[],"class_list":["post-1780","post","type-post","status-publish","format-standard","hentry","category-computer-security","category-news-from-around-the-globe","category-other"],"_links":{"self":[{"href":"https:\/\/people.utm.my\/hazinah\/wp-json\/wp\/v2\/posts\/1780","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/people.utm.my\/hazinah\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/people.utm.my\/hazinah\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/people.utm.my\/hazinah\/wp-json\/wp\/v2\/users\/619"}],"replies":[{"embeddable":true,"href":"https:\/\/people.utm.my\/hazinah\/wp-json\/wp\/v2\/comments?post=1780"}],"version-history":[{"count":0,"href":"https:\/\/people.utm.my\/hazinah\/wp-json\/wp\/v2\/posts\/1780\/revisions"}],"wp:attachment":[{"href":"https:\/\/people.utm.my\/hazinah\/wp-json\/wp\/v2\/media?parent=1780"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/people.utm.my\/hazinah\/wp-json\/wp\/v2\/categories?post=1780"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/people.utm.my\/hazinah\/wp-json\/wp\/v2\/tags?post=1780"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}