Home News Cisco: Cyber Attacks Designed for Destruction, Not Just Disruption?

Cisco: Cyber Attacks Designed for Destruction, Not Just Disruption?

0
Cisco: Cyber Attacks Designed for Destruction, Not Just Disruption?
0

As defenders, one of our key objectives is to help organizations and individual users understand the threat landscape so they can reduce their exposure to cyber threats. Our threat researchers and technology partners watch that ever-changing landscape very closely, as they have for many years now. That’s one reason we are confident when we say that we believe some actors in the shadow economy are making plans to launch cyber attacks that could potentially have a devastating impact that extends far beyond damage to the core target.

This statement is not meant to be sensational. It is only a warning about what we, and others in the security community, sense might be coming. We have no clear insight — yet — into when such an attack might happen or what the targets would be. But as the Cisco 2017 Midyear Cybersecurity Report explains, we find the rapid evolution of threats and the magnitude of the attacks troubling. Based on what we have been observing, we suspect that some adversaries are laying the groundwork for a new type of attack, which we call “destruction of service” or DeOS.

The purpose of such an attack would be to prevent defenders from restoring systems and data. Right now, many security-minded organizations take some comfort in knowing that when they are hit, inevitably, with a DDoS attack, ransomware campaign or other major cyber event, they’ll be able to recover because they have backed up their critical data and systems. DeOS is meant to eliminate that safety net, making it impossible for the business to operate–permanently.

Read the entire article here, Cyber Attacks Designed for Destruction, Not Just Disruption?

via the fine folks at Cisco Systems.

Categories:
Cisco Cisco is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected.

Featured Resources:

Related Articles:

| LATEST FEATURED RESOURCES

White Papers

    Application Lifecycle Management with Stratusphere UX – White Paper

    Enterprises today are faced with many challenges, and among those at the top of the list is the struggle surrounding the design, deployment, management and operations that support desktop applications. The demand for applications is increasing at an exponential rate, and organizations are being forced to consider platforms beyond physical, virtual and cloud-based environments. Users […]

    Downloads

      Download Commvault VM Backup and Recovery: end-to-end VM backup, recovery and cloud management

      Commvault’s ability to provide end-to-end VM backup, recovery and cloud management creates a significantly better way to build, protect and optimize VMs throughout their lifecycle. Our best-in-class software for VM backup, recovery and cloud management delivers a number of significant benefits, including: VM recovery with live recovery options; backup to and in the cloud; custom-fit […]

      On-Demand Webinars

        What’s Going on in EUC Printing – A Technical Deep Dive!

        The IGEL Community and ThinPrint invite you to watch the following technical deep dive webinar. The agenda is to technically bring you up to speed on what’s going on in the EUC Printing space today along with a deep dive into new methods, technologies, printing scenarios and a discussion on why printing still matters. You […]

        Latest Videos

          Views All IT News on DABCC.com
          Views All IT Videos on DABCC.com
          Win big $$, visit ITBaller.com for more info!

          Visit Our Sponsors

          Close