{"id":6860,"date":"2023-01-19T18:16:52","date_gmt":"2023-01-19T16:16:52","guid":{"rendered":"https:\/\/heliview.com\/urity-leadership\/?p=6860"},"modified":"2023-01-19T18:16:52","modified_gmt":"2023-01-19T16:16:52","slug":"elastic-global-threat-report","status":"publish","type":"post","link":"https:\/\/heliview.com\/security-leadership\/elastic-global-threat-report\/","title":{"rendered":"Elastic Global Threat Report"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row][vc_column width=&#8221;2\/3&#8243;][vc_column_text]In Elastic Security Labs&#8217; inaugural threat report, explore threat phenomena and trends, gleaning recommendations to help you prepare for the future of cybersecurity. Learn about the latest malware research, attack patterns, and clusters of malicious activity from a team of seasoned threat researchers working with a broad set of telemetry data.<\/p>\n<p>From this threat report, you&#8217;ll come away with an understanding of how to prevent cybersecurity threats through visibility, capability, and expertise \u2014 all while joining Elastic in its mission to normalize an open approach to security. Key highlights you don\u2019t want to miss:<\/p>\n<ul>\n<li>Nearly 41% of credential access alerts attempted to steal application access tokens versus other credentialed materials<\/li>\n<li>A combined 72% of all defense evasion techniques consisted of masquerading and system binary proxy execution<\/li>\n<li>CobaltStrike was the most popular malicious binary or payload for Windows endpoints with ~35% of all detections<\/li>\n<\/ul>\n[\/vc_column_text]        <div class=\"lgx-subscriber-area\" >\n            <form class=\"vc-whitepaper-form\">\n                <h3>Download the whitepaper<\/h3>\n                <p class=\"nieuwsbrief-validation-error nieuwsbrief-validation-error--message hidden\">\n                    One or more fields have not been filled in or have been filled in incorrectly.\n                <\/p>\n                <div class=\"row\">\n                    <label class=\"col-xs-6\">\n                        First name*<br>\n                        <input type=\"text\" name=\"firstname\" maxlength=\"50\" autocomplete=\"given-name\">\n                    <\/label>\n                    <label class=\"col-xs-6\">\n                        Last name*<br>\n                        <input type=\"text\" name=\"lastname\" maxlength=\"50\" autocomplete=\"family-name\">\n                    <\/label>\n                <\/div>\n                <div class=\"row\">\n                    <label class=\"col-xs-6\">\n                        Company name*<br>\n                        <input type=\"text\" name=\"companyname\" value=\"\" size=\"50\" autocomplete=\"organization\">\n                    <\/label>\n                    <label class=\"col-xs-6\">\n                        Role*<br>\n                        <input type=\"text\" name=\"workdescription\" value=\"\" size=\"100\" autocomplete=\"organization\">\n                    <\/label>\n                <\/div>\n                <label>\n                    Business email address*\n                    <input type=\"email\" id=\"EmailAddressNewsletter\" name=\"email\" \/>\n                <\/label>\n                <p>By clicking on sign up you give permission to be emailed, you will receive the whitepaper in your mailbox.<\/p>\n                <input onclick=\"Website.SubscribeToNewsletter('851292295237', 'eb5838bd-0d52-46c9-9c21-3b35de1e9204')\" type=\"button\" class=\"lgx-btn\" value=\"Sign up\">\n                <div id=\"NewsletterSuccess\" class=\"nieuwsbrief-succes hidden\">Thank you, you will receive an email within a few minutes to download the whitepaper.<\/div>\n                <div id=\"NewsletterError\" class=\"nieuwsbrief-error hidden\">Unfortunately something went wrong; your request was not successful. Please try again later.<\/div>\n            <\/form>\n        <\/div>[vc_empty_space][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_wp_search][vc_wp_posts number=&#8221;5&#8243;]<div class=\"wpb-content-wrapper\">[vc_row][vc_column][vc_raw_html css=&#8221;&#8221;]JTNDZGl2JTIwY2xhc3MlM0QlMjJsZ3gtc3Vic2NyaWJlci1hcmVhJTIyJTNFJTBBJTNDZm9ybSUyMGNsYXNzJTNEJTIybmV3c2xldHRlciUyMiUzRSUwQSUzQ2xhYmVsJTNFJTIwRW1haWwlMjBhZGRyZXNzJTIwJTNDaW5wdXQlMjB0eXBlJTNEJTIydGV4dCUyMiUyMGlkJTNEJTIyRW1haWxBZGRyZXNzTmV3c2xldHRlciUyMiUyMG5hbWUlM0QlMjJlbWFpbCUyMiUyMHBsYWNlaG9sZGVyJTNEJTIyWW91ciUyMGVtYWlsJTIwYWRkcmVzcyUyMiUyMCUyRiUzRSUzQyUyRmxhYmVsJTNFJTBBJTNDaW5wdXQlMjB0eXBlJTNEJTIyYnV0dG9uJTIyJTIwY2xhc3MlM0QlMjJsZ3gtYnRuJTIyJTIwdmFsdWUlM0QlMjJyZWdpc3RlciUyMiUyMG9uY2xpY2slM0QlMjJXZWJzaXRlLlN1YnNjcmliZVRvTmV3c2xldHRlciUyOCUyNzg1MTI5MjI5NTIzNyUyNyUyOSUyMiUzRSUwQSUzQ2RpdiUyMGlkJTNEJTIyTmV3c2xldHRlclN1Y2Nlc3MlMjIlMjBjbGFzcyUzRCUyMm5pZXV3c2JyaWVmLXN1Y2NlcyUyMGhpZGRlbiUyMiUzRVRoYW5rJTIweW91JTJDJTIweW91ciUyMHJlZ2lzdHJhdGlvbiUyMGhhcyUyMGJlZW4lMjBzZW50JTIxJTNDJTJGZGl2JTNFJTBBJTNDZGl2JTIwaWQlM0QlMjJOZXdzbGV0dGVyRXJyb3IlMjIlMjBjbGFzcyUzRCUyMm5pZXV3c2JyaWVmLWVycm9yJTIwaGlkZGVuJTIyJTNFVW5mb3J0dW5hdGVseSUyMHNvbWV0aGluZyUyMHdlbnQlMjB3cm9uZyUzQiUyMHlvdXIlMjByZWdpc3RyYXRpb24lMjB3YXMlMjBub3QlMjBzdWNjZXNzZnVsLiUyMFBsZWFzZSUyMHRyeSUyMGFnYWluJTIwbGF0ZXIuLiUzQyUyRmRpdiUzRSUwQSUzQyUyRmZvcm0lM0UlMEElM0MlMkZkaXYlM0U=[\/vc_raw_html][\/vc_column][\/vc_row]\n<\/div>[\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"In Elastic Security Labs' inaugural threat report, explore threat phenomena and trends, gleaning recommendations to help you prepare for the future of cybersecurity. Learn about the latest malware research, attack patterns, and clusters of malicious activity from a team of seasoned threat researchers working with a broad set of telemetry data. From this threat report, [...]","protected":false},"author":16,"featured_media":6861,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2,3,16],"tags":[],"class_list":["post-6860","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-branche-nieuws","category-congres-update","category-home"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Elastic Global Threat Report - Security Leadership<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/heliview.com\/security-leadership\/elastic-global-threat-report\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_GB\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Elastic Global Threat Report - Security Leadership\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/heliview.com\/security-leadership\/elastic-global-threat-report\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Security Leadership\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/HeliviewCT\" \/>\r\n<meta property=\"article:published_time\" content=\"2023-01-19T16:16:52+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2023\/01\/ELASTIC-Whitepaper.png\" \/>\r\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\r\n\t<meta property=\"og:image:height\" content=\"350\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\r\n<meta name=\"author\" content=\"miki\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@HeliviewConf\" \/>\r\n<meta name=\"twitter:site\" content=\"@HeliviewConf\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"miki\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/heliview.com\/security-leadership\/elastic-global-threat-report\/\",\"url\":\"https:\/\/heliview.com\/security-leadership\/elastic-global-threat-report\/\",\"name\":\"Elastic Global Threat Report - Security Leadership\",\"isPartOf\":{\"@id\":\"https:\/\/heliview.com\/security-leadership\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/heliview.com\/security-leadership\/elastic-global-threat-report\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/heliview.com\/security-leadership\/elastic-global-threat-report\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2023\/01\/ELASTIC-Whitepaper.png\",\"datePublished\":\"2023-01-19T16:16:52+00:00\",\"author\":{\"@id\":\"https:\/\/heliview.com\/security-leadership\/#\/schema\/person\/23de5087e16c5804417bbcf834dc1a3d\"},\"breadcrumb\":{\"@id\":\"https:\/\/heliview.com\/security-leadership\/elastic-global-threat-report\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/heliview.com\/security-leadership\/elastic-global-threat-report\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/heliview.com\/security-leadership\/elastic-global-threat-report\/#primaryimage\",\"url\":\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2023\/01\/ELASTIC-Whitepaper.png\",\"contentUrl\":\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2023\/01\/ELASTIC-Whitepaper.png\",\"width\":1140,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/heliview.com\/security-leadership\/elastic-global-threat-report\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/heliview.com\/security-leadership\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Elastic Global Threat Report\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/heliview.com\/security-leadership\/#website\",\"url\":\"https:\/\/heliview.com\/security-leadership\/\",\"name\":\"Security Leadership\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/heliview.com\/security-leadership\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/heliview.com\/security-leadership\/#\/schema\/person\/23de5087e16c5804417bbcf834dc1a3d\",\"name\":\"miki\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/heliview.com\/security-leadership\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e2072894c7d31a87cfcb8ffc4168a4302d3f97f0927b9f9d897e41a34a857d26?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e2072894c7d31a87cfcb8ffc4168a4302d3f97f0927b9f9d897e41a34a857d26?s=96&d=mm&r=g\",\"caption\":\"miki\"}}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Elastic Global Threat Report - Security Leadership","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/heliview.com\/security-leadership\/elastic-global-threat-report\/","og_locale":"en_GB","og_type":"article","og_title":"Elastic Global Threat Report - Security Leadership","og_url":"https:\/\/heliview.com\/security-leadership\/elastic-global-threat-report\/","og_site_name":"Security Leadership","article_publisher":"https:\/\/www.facebook.com\/HeliviewCT","article_published_time":"2023-01-19T16:16:52+00:00","og_image":[{"width":1140,"height":350,"url":"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2023\/01\/ELASTIC-Whitepaper.png","type":"image\/png"}],"author":"miki","twitter_card":"summary_large_image","twitter_creator":"@HeliviewConf","twitter_site":"@HeliviewConf","twitter_misc":{"Written by":"miki","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/heliview.com\/security-leadership\/elastic-global-threat-report\/","url":"https:\/\/heliview.com\/security-leadership\/elastic-global-threat-report\/","name":"Elastic Global Threat Report - Security Leadership","isPartOf":{"@id":"https:\/\/heliview.com\/security-leadership\/#website"},"primaryImageOfPage":{"@id":"https:\/\/heliview.com\/security-leadership\/elastic-global-threat-report\/#primaryimage"},"image":{"@id":"https:\/\/heliview.com\/security-leadership\/elastic-global-threat-report\/#primaryimage"},"thumbnailUrl":"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2023\/01\/ELASTIC-Whitepaper.png","datePublished":"2023-01-19T16:16:52+00:00","author":{"@id":"https:\/\/heliview.com\/security-leadership\/#\/schema\/person\/23de5087e16c5804417bbcf834dc1a3d"},"breadcrumb":{"@id":"https:\/\/heliview.com\/security-leadership\/elastic-global-threat-report\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/heliview.com\/security-leadership\/elastic-global-threat-report\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/heliview.com\/security-leadership\/elastic-global-threat-report\/#primaryimage","url":"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2023\/01\/ELASTIC-Whitepaper.png","contentUrl":"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2023\/01\/ELASTIC-Whitepaper.png","width":1140,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/heliview.com\/security-leadership\/elastic-global-threat-report\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/heliview.com\/security-leadership\/"},{"@type":"ListItem","position":2,"name":"Elastic Global Threat Report"}]},{"@type":"WebSite","@id":"https:\/\/heliview.com\/security-leadership\/#website","url":"https:\/\/heliview.com\/security-leadership\/","name":"Security Leadership","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/heliview.com\/security-leadership\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/heliview.com\/security-leadership\/#\/schema\/person\/23de5087e16c5804417bbcf834dc1a3d","name":"miki","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/heliview.com\/security-leadership\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e2072894c7d31a87cfcb8ffc4168a4302d3f97f0927b9f9d897e41a34a857d26?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e2072894c7d31a87cfcb8ffc4168a4302d3f97f0927b9f9d897e41a34a857d26?s=96&d=mm&r=g","caption":"miki"}}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/posts\/6860","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/comments?post=6860"}],"version-history":[{"count":1,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/posts\/6860\/revisions"}],"predecessor-version":[{"id":6862,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/posts\/6860\/revisions\/6862"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/media\/6861"}],"wp:attachment":[{"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/media?parent=6860"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/categories?post=6860"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/tags?post=6860"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}