Fri, Feb 25, 2022

Q4 2021 Threat Landscape Virtual Briefing: Software Exploits Abound

Cyber vulnerabilities are being exploited at breakneck speed, with Kroll identifying a 356% growth in the number of incidents where zero-days or freshly-announced vulnerabilities were the initial infection vector, compared to Q3 2021. Adding stress to blue teams trying to manage patches and updates, remnants from attacks against Microsoft Exchange Servers from earlier in 2021 continue to be exploited even after servers have been fully patched.
  
Watch cyber threat intelligence leaders from Kroll (Keith Wojcieszek, Laurie Iacono, and George Glass) explore key insights and trends from over 3,200 cyber incidents handled worldwide in 2021. 

Watch the Webcast replay

This webcast covers: 

  • The most prominent attack methods of 2021 and how they have shifted in recent months
  • Which vulnerabilities are most popular with ransomware actors, including exploitation of the Log4Shell vulnerability
  • The latest extortion tactics used by threat actors to put pressure on organizations to pay ransom demands
  • How adversaries are leveraging Exchange vulnerabilities (tied to ProxyLogon and ProxyShell) to conduct new attacks, even after servers have been fully patched

You can also read the Q4 2021 Threat Landscape Report.

Q4 2021 Threat Landscape Virtual Briefing: Software Exploits Abound /en/insights/webcasts-and-videos/webcast-replay-q4-2021-threat-landscape /-/media/kroll/images/webcasts-and-videos/webcast-q4-2021-threat-landscape.jpg 2022-02-25T00:00:00.0000000 webcast {E39587AD-8F0B-4FE2-865F-969BC5501096}{7A48DD95-1A63-4784-842F-A2BE81EAFE13}{3A077BFC-C74A-40AF-A14C-13BCF6E3873E}{2F9D4938-E5F0-4F9C-9A20-C4A5DCF79130}{ECF5884A-6673-4CA5-B3B4-165229F1A36A}{A3E80394-4BDC-4E1D-8266-0653FE885E69}{809E3BA6-ABC7-4C3B-AB97-D7E5B9A66B24}{7EBB89F8-B33F-4513-8666-35B311DE3778} {6B18A490-2227-426A-A1D0-3836822E90EB}{39CF2F22-8547-4079-A077-D3B865646DE7}{70E25357-B690-49B8-948F-958DAD26DCD4}{C709DABB-FEDB-4060-9674-41B14868A4CC}{2DEEE4D2-8278-4C50-B3FF-1563BB257804}

Connect with us

Keith Wojcieszek
Keith Wojcieszek
Managing Director, Global Head of Threat Intelligence
Cyber Risk
Washington D.C.
Phone
Laurie Iacono
Laurie Iacono
Associate Managing Director
Cyber Risk
Secaucus
Phone

Stay Ahead with Kroll

Cyber Risk

Incident response, digital forensics, breach notification, managed detection services, penetration testing, cyber assessments and advisory.

Computer Forensics

Kroll's computer forensics experts ensure that no digital evidence is overlooked and assist at any stage of an investigation or litigation, regardless of the number or location of data sources.

24x7 Incident Response

Enlist experienced responders to handle the entire security incident lifecycle.

Incident Response Retainer

Kroll delivers more than a typical incident response retainer—secure a true cyber risk retainer with elite digital forensics and incident response capabilities and maximum flexibility for proactive and notification services.

Malware Analysis and Reverse Engineering

Kroll’s Malware Analysis and Reverse Engineering team draws from decades of private and public-sector experience, across all industries, to deliver actionable findings through in-depth technical analysis of benign and malicious code.

Ransomware Preparedness Assessment

Kroll’s ransomware preparedness assessment helps your organization avoid ransomware attacks by examining 14 crucial security areas and attack vectors.

Office 365 Security, Forensics and Incident Response

Digital forensic experts investigate hundreds of Office 365 incidents per year and help strengthen your security.

Managed Security Services

World-renowned cyber investigators and leading technology fuel Kroll’s managed security services, augmenting security operations centres and incident response capabilities.

Insights

Cyber


Q4 2021 Threat Landscape: Software Exploits Abound

Feb 16, 2022

by Keith WojcieszekLaurie Iacono George Glass

The Monitor


Deep Dive Into PYSA Ransomware - The Monitor, Issue 18

Dec 20, 2021

by Keith Wojcieszek Laurie Iacono, Zev Burton, Paul Wells, Stephen Green

Cyber


Insider Threat Indicators and Detection: When Employees Turn Ransomware Accomplices

Jan 24, 2022

by Nicole Sette Anthony Knutson

Cyber


10 Essential Cyber Security Controls for Increased Resilience (and Better Cyber Insurance Coverage)

Nov 03, 2021

by Devon AckermanJeff Macko