{"id":10891,"date":"2018-07-30T17:14:22","date_gmt":"2018-07-30T17:14:22","guid":{"rendered":"https:\/\/prensa.lacnic.net\/news?p=10891"},"modified":"2018-07-30T17:15:39","modified_gmt":"2018-07-30T17:15:39","slug":"major-cyber-security-threats","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/major-cyber-security-threats\/","title":{"rendered":"Major Cyber Security Threats"},"content":{"rendered":"<p>The Forum of Incident Response and Security Teams (FIRST) analyzed the most significant cyber threats worldwide, including digital platforms which offer services for conducting cyber attacks and new extremely destructive forms of malware.<\/p>\n<p>FIRST held its thirtieth annual conference in Kuala Lumpur and was attended by more than 800 experts from around the world, including Graciela Martinez, Head of <a href=\"https:\/\/warp.lacnic.net\/\">LACNIC WARP<\/a>. Martinez was also part of the meeting&#8217;s program committee, which received and evaluated more than 200 proposals for presentations and workshops.<\/p>\n<p>The head of LACNIC WARP pointed out that the FIRST conference is an ideal place to network and share information on this important topic. The meeting also allows gaining first-hand knowledge of the trends in cybersecurity attacks and the growing number of identity theft incidents.<\/p>\n<p>FIRST brings together a variety of computer security incident response teams from academia, civil society, the government sector, and private companies. The organization is designed to facilitate global communication among response teams in order to achieve a prompt and effective resolution when managing security incidents.<\/p>\n<p>The main concerns raised by the experts focused on denial-of-service attacks, the increased frequency of various forms of malware with special emphasis on (increasingly destructive) ransomware, and platforms created for launching security attacks and offered as services in exchange for money. In the so-called dark web, there is a market that offers different \u201ckits\u201d to anyone to seeking to carry out a cyber attack. Among others, a potential attacker can purchase phishing kits at prices that vary depending on the sophistication of each platform.<\/p>\n<p>The FIRST meeting emphasized the importance of having response teams and creating synergy with law enforcement agencies. \u201cThe aim is the early detection of threats and sharing information to help other organizations,\u201d observed the LACNIC expert.<\/p>\n<p>Experts also warned that many organizations are not planning their security issues properly, and that one of the greatest challenges faced by cyber security professionals is describing the risks associated with the protection of information, human resources, and systems at executive level.<\/p>\n<p>Martinez also participated in training on the Malware Information Sharing Platform (MISP), a tool developed for gathering, sharing, storing, and correlating Indicators of Compromise so that different organizations can detect and share intelligence on malware and other threats at an early stage.<\/p>\n<p>\u201cThis platform is also useful for sharing intelligence, currently a major topic for many response teams. This information can be stored and analyzed to draw conclusions regarding potential threats and prevent increasingly sophisticated attacks,\u201d noted Mart\u00ednez.<\/p>\n<p>By sharing information with the MISP threat sharing platform, participants are building a collaborative community for existing threats, whose aim is to help improve countermeasures used against targeted attacks and establish preventative actions and forms of detection.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Forum of Incident Response and Security Teams (FIRST) analyzed the most significant cyber threats worldwide, including digital platforms which offer services for conducting cyber attacks and new extremely destructive forms of malware. FIRST held its thirtieth annual conference in Kuala Lumpur and was attended by more than 800 experts from around the world, including [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":10895,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[499],"tags":[1271,471],"archivo":[1345,852],"taxonomy-authors":[],"tipo_autor":[],"class_list":["post-10891","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cibersecurity","tag-warp-en","archivo-editions","archivo-july-2018-edition"],"acf":{"author":"","related_notes":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | Major Cyber Security Threats<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/major-cyber-security-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | Major Cyber Security Threats\" \/>\n<meta property=\"og:description\" content=\"The Forum of Incident Response and Security Teams (FIRST) analyzed the most significant cyber threats worldwide, including digital platforms which offer services for conducting cyber attacks and new extremely destructive forms of malware. FIRST held its thirtieth annual conference in Kuala Lumpur and was attended by more than 800 experts from around the world, including [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/major-cyber-security-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-30T17:14:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-07-30T17:15:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2018\/07\/las-amenazas-mas-latentes-seguridad.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/major-cyber-security-threats\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/major-cyber-security-threats\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"Major Cyber Security Threats\",\"datePublished\":\"2018-07-30T17:14:22+00:00\",\"dateModified\":\"2018-07-30T17:15:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/major-cyber-security-threats\/\"},\"wordCount\":452,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/major-cyber-security-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2018\/07\/las-amenazas-mas-latentes-seguridad.png\",\"keywords\":[\"Cibersecurity\",\"WARP\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/major-cyber-security-threats\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/major-cyber-security-threats\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/major-cyber-security-threats\/\",\"name\":\"LACNIC Blog | Major Cyber Security Threats\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/major-cyber-security-threats\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/major-cyber-security-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2018\/07\/las-amenazas-mas-latentes-seguridad.png\",\"datePublished\":\"2018-07-30T17:14:22+00:00\",\"dateModified\":\"2018-07-30T17:15:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/major-cyber-security-threats\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/major-cyber-security-threats\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/major-cyber-security-threats\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2018\/07\/las-amenazas-mas-latentes-seguridad.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2018\/07\/las-amenazas-mas-latentes-seguridad.png\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/major-cyber-security-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Major Cyber Security Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | Major Cyber Security Threats","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/major-cyber-security-threats\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | Major Cyber Security Threats","og_description":"The Forum of Incident Response and Security Teams (FIRST) analyzed the most significant cyber threats worldwide, including digital platforms which offer services for conducting cyber attacks and new extremely destructive forms of malware. FIRST held its thirtieth annual conference in Kuala Lumpur and was attended by more than 800 experts from around the world, including [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/major-cyber-security-threats\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2018-07-30T17:14:22+00:00","article_modified_time":"2018-07-30T17:15:39+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2018\/07\/las-amenazas-mas-latentes-seguridad.png","type":"image\/png"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/major-cyber-security-threats\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/major-cyber-security-threats\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"Major Cyber Security Threats","datePublished":"2018-07-30T17:14:22+00:00","dateModified":"2018-07-30T17:15:39+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/major-cyber-security-threats\/"},"wordCount":452,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/major-cyber-security-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2018\/07\/las-amenazas-mas-latentes-seguridad.png","keywords":["Cibersecurity","WARP"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/major-cyber-security-threats\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/major-cyber-security-threats\/","url":"https:\/\/blog.lacnic.net\/en\/major-cyber-security-threats\/","name":"LACNIC Blog | Major Cyber Security Threats","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/major-cyber-security-threats\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/major-cyber-security-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2018\/07\/las-amenazas-mas-latentes-seguridad.png","datePublished":"2018-07-30T17:14:22+00:00","dateModified":"2018-07-30T17:15:39+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/major-cyber-security-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/major-cyber-security-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/major-cyber-security-threats\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2018\/07\/las-amenazas-mas-latentes-seguridad.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2018\/07\/las-amenazas-mas-latentes-seguridad.png","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/major-cyber-security-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"Major Cyber Security Threats"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2018\/07\/las-amenazas-mas-latentes-seguridad.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":10889,"post_title":"Las amenazas m\u00e1s latentes","slug":"las-amenazas-mas-latentes","href":"https:\/\/blog.lacnic.net\/las-amenazas-mas-latentes\/"},{"locale":"pt_BR","id":10893,"post_title":"As amea\u00e7as mais latentes","slug":"as-ameacas-mais-latentes","href":"https:\/\/blog.lacnic.net\/pt-br\/as-ameacas-mais-latentes\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/10891","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=10891"}],"version-history":[{"count":1,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/10891\/revisions"}],"predecessor-version":[{"id":10892,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/10891\/revisions\/10892"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/10895"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=10891"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=10891"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=10891"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=10891"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=10891"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=10891"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}