Statistics About Cyber Attacks Will Surprise You!

A newly dis­cov­ered attack­ing method that exploits a built-in fea­ture of Microsoft Office is cur­rently being used in var­i­ous wide­spread mal­ware attack cam­paigns called DDE. This exploita­tion tech­nique dis­plays no “secu­rity” warn­ings to vic­tims. Dynamic Data Exchange (DDE) pro­to­col is one of the sev­eral meth­ods that Microsoft uses to allow two run­ning appli­ca­tions to share the same data.

The pro­to­col is being used by thou­sands of apps, includ­ing MS Excel, MS Word, Quat­tro Pro, and Visual Basic for one-time data trans­fers and for con­tin­u­ous exchanges for send­ing updates to one another.

To be pro­tected from this attack it is highly rec­om­mended to dis­able the “update auto­matic links at open” option in the MS Office soft­ware. To do so, for exam­ple, go to

Word File Options Advanced and scroll down to Gen­eral and then uncheck “Update

auto­matic links at open”

Cyber Secu­rity Statistics

Dis­trib­uted Denial of Ser­vice (DDoS) attack is a well-known threat in Cyber Secu­rity field. Such

attack has the abil­ity to inter­rupt the server per­for­mance sig­nif­i­cantly. Arbor Net­works analyzed

data received by 335 dif­fer­ent ISPs to ana­lyze cyber­se­cu­rity trends and found that the Mid­dle East suf­fered a total of 23,000 DDoS attacks in the pre­vi­ous month only. The most tar­geted areas were Saudi Ara­bia and Kuwait. %38 of the attacks were over 1 Gbps, but the global peak hit Saudi Ara­bia reached 140 Gbps.

New Cyber Threats

Secu­rity researchers have dis­cov­ered a new privilege-escalation vul­ner­a­bil­ity in Linux ker­nel, that allows a local attacker to exe­cute code on the affected sys­tems with root access priv­i­lege. The dis­cov­ered secu­rity vul­ner­a­bil­ity impacts the Advanced Linux Sound Archi­tec­ture (ALSA), which is a soft­ware frame­work that estab­lishes an Appli­ca­tion Pro­gram­ming Inter­face (API) for sound card dri­vers in the Linux kernel.


Cyber Secu­rity Tip

Did you know that com­pany employ­ees are respon­si­ble for %60 of all dig­i­tal attacks endured by

enter­prises? Many of the most news­wor­thy breaches don’t come through the front door but from inter­nal weak­nesses. That’s why it’s highly essen­tial to be pro­tected from pos­si­ble inter­nal threats as much as being pro­tected against exter­nal threats.