Research from an enterprise security firm has revealed cyber-attackers exploit business applications to bypass security controls.
According to a report from the security firm, Palo Alto Networks, traditional exploit techniques used in innovative ways can mask dangerous threat activity.
The report said: "Today's advanced cyber threats use applications as their infiltration vector, exhibit application-like evasion tactics, and act as, or use common network applications for communications and exfiltration."
Common sharing applications such as email, social media and video remain favoured vehicles for delivering attacks. Researchers found that nearly 19% of threats observed were code execution exploits that were delivered across common sharing applications.
Researchers have also said selective decryption, in conjunction with enablement policies, can help businesses uncover and eliminate potential hiding places for cyber threats.
Return to internet news headlines
View Internet News Archive