Your Cybersecurity Forecast: Current Threat Trends and Insights for 2015 and Beyond

Today's threat landscape is exponentially more complicated than it was even a few years ago and will continue to diversify in methods and complexity going forward. Traditional, signature-based antivirus technology can no longer consistently remediate against the majority of them. Organizations must have a clear understanding of what these threats entail to adapt and proactively respond to these fast-mutating threats.

In this must-see webinar, Grayson Milbourne, security intelligence director at Webroot, examines the threat data collected from Webroot's broad base of customers, including information from:

  • 10 million endpoints;
  • 16 million mobile apps;
  • 600 million domains; and
  • 4 billion IPs

Register for this webinar to gain expert insight on:

  • Malicious IP trends, including the number of new IPs released in the wild and the length of time in operation;
  • Phishing trends and targets;
  • Mobile malware trends, including those triggered by a simple MMS; and
  • Latest ransomware developments and delivery methods, including "ransomware-as-a-service."


As organizations improve their cybersecurity threat postures, cyber criminals develop more intricate methods to infiltrate these networks. And 2015 appears to be a watershed year, both in terms of malware growth and in the panoply of tactics now used to break through stronger and stronger defenses. New innovations in malware, including persistent fileless backdoors and new ransomware infections disguised as decryption tools, as well as more sophisticated means of evasion, require organizations to develop defense strategies that rival those of military leaders.

What happens to organizational cyber defense when cybercriminals can buy competitively priced ransomware on the black market? Or when a given piece of malware disappears from a malicious IP address--only to show up at another malicious address days later? And what does an organization need to know to avoid becoming the latest victim of an attack?

This important webinar will discuss the key findings from analysis performed by Webroot's Threat Research Team, including:

  • Why cybercriminals from most nations like to host malware on US-based IPs and URLs;
  • How threat operations have become increasingly interconnected in nature;
  • Why organizations need to pool their information to discover and threat potential threat vectors; and
  • How Webroot's BrightCloud Threat Intelligence platform works to create the collective intelligence needed to thwart the bad guys.

Download File