Why Endpoint Resilience Is Important

 

LastPass, a password management company, made headlines last month when it revealed that one of their DevOps engineers had his personal home computer hacked and infected with keylogging malware, resulting in the exfiltration of corporate data from the vendor’s cloud storage resources. The story sheds new light on the significance of endpoint resilience. 
Typically, media coverage of mega breaches (e.g., AT&T, Independent Living Systems, Zoll Medical Data, Latitude Financial Services) focuses on the exfiltration points rather than how the threat actor got there. However, post-mortem analysis has repeatedly revealed that compromised credentials are the most common source of a hack, which is then used to establish a beachhead on an end-user endpoint (e.g., a computer). As a result, comprehensive cybersecurity strategies should include endpoint resiliency as an essential component of the overall approach.
The Lifecycle of a Cyberattack Today
The majority of today’s cyberattacks begin with credential harvesting campaigns that employ social engineering techniques, password sniffers, phishing campaigns, digital scanners, malware attacks, or a combination of these. Cybercriminals also profit from the sale of millions of stolen credentials on the Dark Web.
Attackers use brute force, credential stuffing, or password spraying campaigns to gain ac

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from CySecurity News – Latest Information Security and Hacking Incidents

Read the original article: