- Jul 22, 2014
- 2,525
Exploits take advantage of weaknesses in legitimate software products like Adobe Flash and Microsoft Office to infect computers for criminal purposes. They’re commonly leveraged by cybercriminals in order to penetrate organizations’ defenses. The objectives of these criminals are diverse: stealing data or holding it for ransom, performing reconnaissance, or simply as a means to deploy more traditional malware.
It’s common to find exploits used as part of cyber attacks: upwards of 90% of reported data breaches find that an exploit is used at one or more points in the attack chain. Including exploit prevention as part of a comprehensive lineup of security defenses is clearly valuable. Exploits have been around for more than 30 years, so it should come as no surprise that almost every major security vendor can claim some level of exploit prevention. However, the breadth and depth of that protection varies significantly between vendors. For some, it’s a box to tick; for others, it’s a major focal point. Read this paper to learn more about exploits and the various levels of exploit prevention found in prominent security products.
way more in the link above
It’s common to find exploits used as part of cyber attacks: upwards of 90% of reported data breaches find that an exploit is used at one or more points in the attack chain. Including exploit prevention as part of a comprehensive lineup of security defenses is clearly valuable. Exploits have been around for more than 30 years, so it should come as no surprise that almost every major security vendor can claim some level of exploit prevention. However, the breadth and depth of that protection varies significantly between vendors. For some, it’s a box to tick; for others, it’s a major focal point. Read this paper to learn more about exploits and the various levels of exploit prevention found in prominent security products.
way more in the link above