Site icon Panda Security Mediacenter

Panda Security launches its Threat Insights Report 2020

Panda Security launches its Threat Insights Report 2020

The cybersecurity landscape never stops evolving, and both the scope and velocity of this evolution are increasing and becoming more unpredictable. Antivirus solutions based on specific signatures and generic and heuristic detection are not enough to be able to deal with the flood of new, highly sophisticated malware variants, which continue to infect the systems of companies with lower levels of protection.

Fortunately, as cyberthreats evolve, so too does cybersecurity technology. IT security solutions employ a range of capacities designed to keep networks from being infiltrated, to detect and stop suspicious behavior, and get ahead of future intrusions. In a new landscape with endless unknowns, what should cybersecurity look like in a changing environment?

At PandaLabs, Panda Security’s security laboratory, we registered and analyzed 14.9 million malware events in 2019, stopping 7.9 million potentially Unwanted Programs (PUPs), as well as 76,000 alerts for exploits that intended to leverage vulnerabilities in applications, networks, or hardware in order to compile the main cybersecurity threats and trends in our report. Discover the leading cybercriminal techniques and what you can do to stop them.

Download the report

This data reinforces the idea behind our cybersecurity model: reactive security is no longer appropriate. There are too many threats and too many attack vectors in any IT environment, all of which can cause a breach. Today, cybersecurity solutions must be predictive, proactive, and prepared to respond to any incident that could arise. 

The main cybersecurity technology trends in Q1 2020

Cybercriminals are increasingly stealthy, eagerly taking advantage of errors, hiding their movements, and getting around detection technologies, especially in the cloud, through mobile applications, and on networks.

Cybercriminals are essentially after three things:

How do they manage to do this? Some of the main cyberthreats of the start of this year are:

There are increasing numbers of interconnected endpoints, from workstations, to laptops and servers. All of these endpoints require an approach that combines advanced endpoint protection (EPP) and endpoint detection and response (EDR), based on a zero-trust security posture, backed by artificial intelligence. The application of these technologies to cybersecurity is a necessary change in how the industry addresses the problem of cyberthreats. It emphasizes the idea of goodware—known, registered, and classified processes that can run on the endpoint—ensuring that unknown and malicious processes cannot run.

Conclusions: the advantages of multilayer protection

The latest threats require a cybersecurity that has evolved from single technology solutions to multi-layer solutions that employ behavior-based monitoring, among other features, to eliminate persistent threats, fileless attacks, and other malicious activity.

This has resulted in a layered technology model combined with a zero-trust security posture that doesn’t let any unknown processes run on any endpoints on the network. This technology provides two pain advantages:

Discover all the advantages of the only solution on the market that classifies 100% of running processes on computers. You can also find out the countries that have been worse hit by different malware families, as well as other data analyzed by PandaLabs here:

Download the report

 

Exit mobile version