sb-au logo
Story image

How technical research can help businesses stay secure

02 Apr 2019

As cybercrime and malware attacks become more prevalent and dangerous, it’s important to understand the role research and study have in combatting cybercrime developments and protecting organisations against growing threats. High-quality malware research is necessary to keep cybercrime at bay, according to ESET. 

Malware’s effect on large organisations and even governments are becoming more pronounced, as evidenced by February’s large-scale cyber attack affecting all three major political parties.

It’s increasingly important for public and private-sector organisations to realistically address their cybersecurity vulnerabilities. More and more, responsible cybersecurity practice requires organisations to be accountable and open, setting a positive culture in cybercrime awareness and discussion. 

ESET senior malware researcher Robert Lipovsky says, “More organisations should reveal their experiences with cybercrime, rather than try to cover them up, to foster a greater culture of awareness and understanding, because we’re all in this together. 

“Greater awareness of cybersecurity risks relies on in-depth malware research. ESET researchers’ investigations into large-scale malware and ransomware events, including BlackEnergy, and NotPetya; the most damaging cyber attack in history, has been critical in understanding and predicting cybercriminals’ movements, targets and intentions.” 

“Comprehensive research into malware like BlackEnergy has also helped cybersecurity experts identify successor threats. For example, GreyEnergy was named in a streak of energy company attacks across Europe late last year. Existing research is critical in mitigating risks as they occur and in preventing further malware development.” 

Increasingly, researchers are employing machine learning (ML) to analyse detected malware and develop security systems capable of matching sophisticated cybercrime. Although a critical predictive and defensive tool, many cybercriminals also use ML to create malware specifically designed to outsmart existing security suites and features. 

Lipovsky continues, “Many security researchers expect a cat-and-mouse game between the good guys and the bad guys to continue. While both sides are armed with access to ML technology and highly skilled professionals, the competition between cybersecurity professionals and cybercriminals will most likely be long-term and ongoing. 

“What’s set to distinguish these competing forces is a dedication to research, malware tracking and analysis, and malware education, which continues to strengthen quality security developments in niche and relevant ways and catch the next strains of malware.” 
“Research helps security professionals learn how malware criminals operate, and what they might do next.” 

Cyber attacks affecting governments and organisations are becoming stronger and harder to detect, as malware developers design infections that blend into the background. 

Quality malware research is a strong differentiator between cybersecurity professionals and cybercriminals, and, with the right public dialogue around cyber attacks, can help organisations get ahead of attackers. 

Link image
Why it's crucial to normalise proper security training for remote working
Knowing and implementing best practices for remote security can save money, time and headaches. It starts with a quality solution to safeguard the workforce.More
Link image
Webinar: Best practices for managing disparate security solutions
As budgets get more constrained, the emphasis shifts from merely finding threats to increased efficiency in managing security operations. Learn how to juggle a crowded field of solutions.More
Link image
VR a leading factor in edge computing, says Gartner
Edge architectures and technologies, including VR, will be an essential component of innovative products and services.More
Story image
Emotet malware is on a rampage after months of silence
CERT agencies around the world are reporting a surge in cyber attacks related to the Emotet malware, which is being distributed by email.More
Story image
The guide to digital security in unstable times
An increase in vulnerability across different sectors has meant that 2020 has seen more than its fair share of cybersecurity incidents. One of the most effective ways to combat the perils of today’s cyber-threats is to gain a better knowledge of the threat vectors looming over the heads of organisations. More
Story image
Ripple20 threat has potential for 'vast exploitation', ExtraHop researchers find
One in three IT environments are vulnerable to a cyber threat known as Ripple20. This is according to a new report from ExtraHop, a cloud-native network detection and response solutions provider. More