30% of Q4 Malware was New or Zero-Day

WatchGuard quarterly report, based on Firebox Feed data, lists five key findings on Internet security threats.

Dark Reading Staff, Dark Reading

March 30, 2017

1 Min Read
Dark Reading logo in a gray background | Dark Reading

New data from network security firm WatchGuard Technologies shows that nearly one third of all malware samples in the fourth quarter of 2016 were new or zero-day.

WatchGuard's quarterly report on Internet security covers related threat issues and their effect on businesses. The data comes via Firebox Feed, anonymized data from over 24,000 WatchGuard unified threat management (UTM) appliances worldwide.

The report points to five crucial findings. First, hackers are using old attack methods in new packaging and second, 30% of malware is still new or zero-day because it manages to avoid discovery due to lack of advanced detection techniques. WatchGuard's data also showed that JavaScript is used extensively in malware delivery while Web browsers and services are targeted the most. And the top network attack is Wscript.shell Remote Code Execution, targeting Germany 99% of the time.

"Each quarter, our report will marry new Firebox Feed data with original research and analysis of major information security events to reveal key threat trends and provide defense best practices," says Corey Nachreiner, CTO of WatchGuard Technologies.

Read full report here.

About the Author

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights