Line 23: |
Line 23: |
| # [[Cryptojacking]], as the value of cryptocurrencies increases. | | # [[Cryptojacking]], as the value of cryptocurrencies increases. |
| | | |
− | * Mandiant's M-Trends 2021 Report<ref>[https://content.fireeye.com/m-trends/rpt-m-trends-2021 Executive Summary, 2021 M-Trends Report]</ref> | + | * [[Mandiant]]'s M-Trends 2021 Report<ref>[https://content.fireeye.com/m-trends/rpt-m-trends-2021 Executive Summary, 2021 M-Trends Report]</ref> |
| # 59% of the security incidents investigated by Mandiant last year were initially detected internally by the organizations themselves (12% better than in 2019). | | # 59% of the security incidents investigated by Mandiant last year were initially detected internally by the organizations themselves (12% better than in 2019). |
| # Ransomware has evolved and now employs various extortion tactics. | | # Ransomware has evolved and now employs various extortion tactics. |
Line 31: |
Line 31: |
| # 63% of attackers used techniques outlined in the [https://attack.mitre.org/ MITRE ATT&CK framework], and 5% of intrusions used over 1/3 of MAF techniques. | | # 63% of attackers used techniques outlined in the [https://attack.mitre.org/ MITRE ATT&CK framework], and 5% of intrusions used over 1/3 of MAF techniques. |
| # Threat actors exploited vulnerabilities in the infrastructure supporting work at home. | | # Threat actors exploited vulnerabilities in the infrastructure supporting work at home. |
| + | |
| + | * [[Spamhaus]]'s 2021 Q2 Report<ref>[https://www.spamhaus.org/news/article/813/spamhaus-botnet-threat-update-q2-2021 Botnet Update,Spamhaus]</ref> <br/> |
| + | This report focused on [[Botnet Attacks|botnet]] [[Command and Control]] activity and compared the findings from Q1 with Q2. |
| + | :*Key figures: |
| + | # A 594% increase of newly registered botnet C&C domains at [[NameSilo]]! This sudden uptick knocked [[Namecheap]] out of first place. |
| + | # Working with the [[FBI]], Spamhaus discovered 1.3 million compromised email accounts; 22,000 compromised domains; and 3,000 compromised networks. |
| | | |
| ==Organizations== | | ==Organizations== |