{"id":7984,"date":"2017-06-19T08:11:15","date_gmt":"2017-06-19T16:11:15","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/06\/19\/news-1765\/"},"modified":"2017-06-19T08:11:15","modified_gmt":"2017-06-19T16:11:15","slug":"news-1765","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/06\/19\/news-1765\/","title":{"rendered":"Breaking the attack chain"},"content":{"rendered":"<p><strong>Credit to Author: Wendy Zamora| Date: Mon, 19 Jun 2017 15:52:56 +0000<\/strong><\/p>\n<p>The attack chain. It\u2019s a term used often in infosecurity. Also known as the kill chain, it was originally used as a military concept to describe the structure of an attack. It serves the same function in cybersecurity, where various methods of malware infiltration, deployment, and execution are outlined. To break the attack chain, then, means to preempt the attack.<\/p>\n<p>This is of obvious significance to business owners, who\u2019d much rather avoid expensive and time-sucking breach cleanups with programs that prevent\u00a0attacks altogether. But breaking the attack chain is not as simple as it used to be.<\/p>\n<p>Cybercriminals are constantly changing methodologies and deployment vectors to fool endpoint defenses. The attack chain is evolving and multiplying, out-thinking traditional, signature-based endpoint security. In fact, nearly 80 percent of businesses have suffered a security-related breach in the last year.<\/p>\n<p>That\u2019s why businesses need to evolve their endpoint protection strategy, using a multi-layered approach to stop malware deployment and execution in multiple attack chains. In the following infographic, we\u2019ve outline how Malwarebytes does just this, using seven different, complementary technologies.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/pdf\/infographics\/BreakingTheAttackChain.pdf?utm_source=blog&amp;utm_medium=social\" target=\"_blank\" rel=\"noopener noreferrer\">Click here<\/a> for the full PDF version.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-18388\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/INFOGRAPHIC-Malwarebytes-Breaking-the-Attack-Chain-FINAL-DRAFT-01.jpg\" alt=\"breaking the attack chain\" width=\"3750\" height=\"17917\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/INFOGRAPHIC-Malwarebytes-Breaking-the-Attack-Chain-FINAL-DRAFT-01.jpg 3750w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/INFOGRAPHIC-Malwarebytes-Breaking-the-Attack-Chain-FINAL-DRAFT-01-63x300.jpg 63w\" sizes=\"auto, (max-width: 3750px) 100vw, 3750px\" \/><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/06\/breaking-the-attack-chain\/\">Breaking the attack chain<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/06\/breaking-the-attack-chain\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Wendy Zamora| Date: Mon, 19 Jun 2017 15:52:56 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/101\/2017\/06\/breaking-the-attack-chain\/' title='Breaking the attack chain'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/newblogpic-1.png' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>The attack chain is evolving, out-thinking traditional, signature-based endpoint security. See how Malwarebytes breaks the chains, defeating advanced threats with new technologies.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/101\/\" rel=\"category tag\">101<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/101\/business\/\" rel=\"category tag\">Business<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/attack-chain\/\" rel=\"tag\">attack chain<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/attack-vector\/\" rel=\"tag\">attack vector<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/multi-layer-protection\/\" rel=\"tag\">multi-layer protection<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/101\/2017\/06\/breaking-the-attack-chain\/' title='Breaking the attack chain'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/06\/breaking-the-attack-chain\/\">Breaking the attack chain<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10519,12702,12703,1001,12704],"class_list":["post-7984","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-10519","tag-attack-chain","tag-attack-vector","tag-business","tag-multi-layer-protection"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7984","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7984"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7984\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7984"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7984"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7984"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}