<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
    <channel>
        <title>Elastic Security Labs - Reports</title>
        <link>https://www.elastic.co/cn/security-labs</link>
        <description>Trusted security news &amp; research from the team at Elastic.</description>
        <lastBuildDate>Tue, 21 Apr 2026 09:03:22 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <image>
            <title>Elastic Security Labs - Reports</title>
            <url>https://www.elastic.co/cn/security-labs/assets/security-labs-thumbnail.png</url>
            <link>https://www.elastic.co/cn/security-labs</link>
        </image>
        <copyright>© 2026. elasticsearch B.V. All Rights Reserved</copyright>
        <item>
            <title><![CDATA[What the 2025 Elastic Global Threat Report reveals about the evolving threat landscape]]></title>
            <link>https://www.elastic.co/cn/security-labs/elastic-publishes-2025-global-threat-report</link>
            <guid>elastic-publishes-2025-global-threat-report</guid>
            <pubDate>Wed, 08 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[The 2025 Elastic Global Threat Report provides current insights on adversary trends and defender strategies derived from real-world telemetry.]]></description>
            <content:encoded><![CDATA[<p>For the fourth consecutive year, Elastic Security Labs presents its <a href="https://www.elastic.co/cn/resources/security/report/global-threat-report">2025 Global Threat Report</a>, distilling real-world user telemetry to offer critical insights into the evolving threat landscape. This year's report delves into how AI is redefining threats, highlights areas where adversaries are intensifying their efforts, and provides actionable strategies for enterprises to proactively counter these emerging risks.</p>
<h2>Key highlights</h2>
<ul>
<li>
<p><strong>Adversary priorities on Windows are changing.</strong> The tactic category of <strong>Execution</strong> now accounts for <strong>nearly double</strong> its previous share and surpasses <strong>Defense Evasion</strong> as the top tactic.</p>
</li>
<li>
<p><strong>The cloud attack surface is highly concentrated.</strong> Over <strong>60% of all cloud security events</strong> boil down to just three adversary goals: Initial Access, Persistence, and Credential Access.</p>
</li>
<li>
<p><strong>Adversaries are weaponizing AI to lower the barrier to entry for cybercrime.</strong> We saw an <strong>increase in Generic threats</strong>, a trend likely influenced by adversaries using large language models (LLMs) to quickly generate simple but effective malicious loaders and tools.</p>
</li>
<li>
<p><strong>The theft of browser credentials has industrialized.</strong> Our analysis of over 150,000 malware samples revealed that <strong>more than one in eight</strong> are designed to steal browser data. This isn't for isolated use; these credentials are the raw material fueling the <strong>access broker economy</strong>, providing a steady supply of keys for other attackers to compromise corporate cloud accounts.</p>
</li>
</ul>
<h3>What we learned from the report</h3>
<p>The security landscape is undergoing a rapid transformation. Adversaries’ AI-driven threat innovation is evolving at an accelerated pace via streamlined information synthesis and automated workflows. This is resulting in more diverse adversary capabilities and new, indirect avenues of access. AI’s role on both sides of the cyber battle is anticipated to shift significantly as these technologies become more widespread.</p>
<p>This report uncovers real-world threat activities, revealing a fundamental shift in how adversaries achieve success today. It also includes a new section describing our visibility from non-telemetry sources, highlighting which malware families and threat behaviors were seen externally.</p>
<p>Access brokers are increasingly using information stealers to maintain a distance from collective defense efforts, significantly escalating the risks of credential exposure through cloud storage and other services. Trojanized software, which represented about 61% of all malware samples observed, was a major contributor; the ClickFix methodology is one of the most common techniques used to deliver trojans and infostealers. More than 24% of malware samples on Windows represented named infostealer code families.</p>
<p><img src="https://www.elastic.co/cn/security-labs/assets/images/elastic-publishes-2025-global-threat-report/image2.png" alt="" /></p>
<p>Defense Evasion techniques have held the top spot for several years. This is attributed to improvements in detection and response capabilities that drive adversaries toward edge devices with a powerful capacity for exploit development. Execution rose to more than 32% of techniques followed by defense evasion at 23% and initial access around 19%. Together, these larger patterns reveal that attackers are investing in gaining a cheap foothold with minimum exposure and quickly running other malicious code. Scripts and browser-based techniques as well as SaaS compromise attempts show us another aspect of these threat trends and highlight areas where many enterprises could improve their defenses.</p>
<p>Threat profiles for BANSHEE, EDDIESTEALER, and ARECHCLIENT2 demonstrate how some of the most popular novel discoveries from the Elastic Security Labs team used infostealers. REF7707, a threat campaign involving the FINALDRAFT, PATHLOADER, and GUIDLOADER malware families, provides details about how an espionage-motivated threat evaded defenses using Microsoft’s GraphAPI for C2. Without the visibility shared by our customers, these threats may have made a much bigger impact before being revealed.</p>
<p><img src="https://www.elastic.co/cn/security-labs/assets/images/elastic-publishes-2025-global-threat-report/image4.png" alt="" /></p>
<h2>Navigate the AI-era threat landscape with Elastic</h2>
<p><a href="https://www.elastic.co/cn/security-labs">Elastic Security Labs</a> is dedicated to providing crucial, timely security research to the intelligence community. This report reveals a shift in the threat landscape — one in which AI is continuing to surface as a tool for both adversaries and defenders. With Elastic as your partner, this <a href="https://www.elastic.co/cn/resources/security/report/global-threat-report">2025 Elastic Global Threat Report</a> empowers you to make informed decisions on how best to address these evolving threats.</p>
<p><em>The release and timing of any features or functionality described in this post remain at Elastic's sole discretion. Any features or functionality not currently available may not be delivered on time or at all.</em></p>
<p><em>In this blog post, we may have used or referred to third party generative AI tools, which are owned and operated by their respective owners. Elastic does not have any control over the third party tools and we have no responsibility or liability for their content, operation or use, nor for any loss or damage that may arise from your use of such tools. Please exercise caution when using AI tools with personal, sensitive or confidential information. Any data you submit may be used for AI training or other purposes. There is no guarantee that information you provide will be kept secure or confidential. You should familiarize yourself with the privacy practices and terms of use of any generative AI tools prior to use.</em></p>
<p><em>Elastic, Elasticsearch, and associated marks are trademarks, logos or registered trademarks of Elasticsearch N.V. in the United States and other countries. All other company and product names are trademarks, logos or registered trademarks of their respective owners.</em></p>]]></content:encoded>
            <category>security-labs</category>
            <enclosure url="https://www.elastic.co/cn/security-labs/assets/images/elastic-publishes-2025-global-threat-report/gtr-w.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Now available: the 2025 State of Detection Engineering at Elastic]]></title>
            <link>https://www.elastic.co/cn/security-labs/state-of-detection-engineering-at-elastic-2025</link>
            <guid>state-of-detection-engineering-at-elastic-2025</guid>
            <pubDate>Thu, 24 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[The 2025 State of Detection Engineering at Elastic explores how we create, maintain, and assess our SIEM and EDR rulesets.]]></description>
            <content:encoded><![CDATA[<p>We’ve been working hard at Elastic Security Labs! We've just published a brand new report: <a href="https://www.elastic.co/cn/resources/security/report/state-of-detection-engineering-at-elastic"><strong>the 2025 State of Detection Engineering at Elastic</strong></a>. This report gives readers an exclusive look into the work of developing and maintaining our pre-built <a href="https://elastic.github.io/detection-rules-explorer/">SIEM Detection</a> rules and <a href="https://github.com/elastic/protections-artifacts/tree/main/behavior">Endpoint Protection Behavior</a> rulesets.</p>
<p>In this report, you'll get an inside look at how we work to keep our users protected and gain valuable insights into the world of detection engineering, like:</p>
<ul>
<li>How we analyze real-world threats, like the CUPS vulnerability and Windows Local Privilege Escalation.</li>
<li>Our robust rule development strategies, including automation and the <a href="https://www.elastic.co/cn/security-labs/elastic-releases-debmm">Detection Engineering Behavioral Maturity Model (DEBMM)</a>.</li>
<li>Enhancements to <a href="https://www.elastic.co/cn/security">Elastic Security</a> through integration enrichments with AWS, Okta, and more.</li>
<li>Our internal metrics and evaluation processes for ensuring rule effectiveness.</li>
<li>Our partnership with the <a href="https://www.elastic.co/cn/resources/security/report/global-threat-report">Elastic Global Threat Report</a> and our future plans, including AI threat detection.</li>
</ul>
<p>This report represents a full year of our detection engineering efforts, from October 2023 to October 2024. We chose this timeframe to capture our work following the 2023 Elastic Global Threat Report and gather enough data to identify meaningful patterns.</p>
<p>We collected and analyzed all the contextual data of an entire year’s worth of detection engineering efforts to build out the story of what we do and how we do it. Including Security Labs threat research publications, GitHub metadata from activity across our rules repos, alert telemetry, and operational metric data are used to both guide and assess our detection engineering efforts. We also conducted a series of interview-style conversations with the threat researchers, detection engineers, and developers behind the data. We wanted to dive-deep into the specifics and garner the details of the processes behind the outputs (detection rules, threat research articles, etc.) that our customers see. Then we put these details together to create a cohesive story that might benefit the larger community.</p>
<p>We’re pulling back the curtain on our detection engineering practices, going beyond the traditional survey-style State of Detection Engineering report. By revealing this information — information that security tool creators often keep private — we aim to demonstrate our commitment to our users and reinforce the fact that you are not alone in your security journey. We’re right here with you, every step of the way.</p>
<h2>The discussion continues</h2>
<p>Elastic Security Labs is dedicated to providing in-depth research to the security community — whether you’re an Elastic customer or not. By sharing the details of how we manage and leverage the Elastic Security solution, we hope to spark a broader conversation around detection engineering and encourage the community to hold our work accountable. If you’re interested in a broader look at the report, you can check out the <a href="https://www.elastic.co/cn/blog/state-of-detection-engineering-at-elastic-2025">blog on Elastic</a>.</p>
<p><a href="https://www.elastic.co/cn/resources/security/report/state-of-detection-engineering-at-elastic">Download the free report</a>, and <a href="https://x.com/elasticseclabs">join the conversation</a>!</p>]]></content:encoded>
            <category>security-labs</category>
            <enclosure url="https://www.elastic.co/cn/security-labs/assets/images/state-of-detection-engineering-at-elastic-2025/header.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Elastic publishes 2024 Global Threat Report]]></title>
            <link>https://www.elastic.co/cn/security-labs/elastic-publishes-2024-gtr</link>
            <guid>elastic-publishes-2024-gtr</guid>
            <pubDate>Tue, 01 Oct 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[Elastic Security Labs has released the 2024 Elastic Global Threat Report, surfacing the most pressing threats, trends, and recommendations to help keep organizations safe for the upcoming year.]]></description>
            <content:encoded><![CDATA[<p><em>Elastic Security Labs discovers that threat actors are taking advantage of readily available and commonly abused security tools, and misconfigured environments.</em></p>
<p>Elastic Security Labs has released the <a href="http://www.elastic.co/cn/blog/elastic-global-threat-2024">2024 Elastic Global Threat Report</a>, surfacing the most pressing threats, trends, and recommendations to help keep organizations safe for the upcoming year. Threat actors are finding success from the use of offensive security tools (OSTs), a misconfiguration of cloud environments, and a growing emphasis on Credential Access. This report explores key telemetry from over a billion data points with emphasis on malware trends, adversary tactics, cloud security, and generative AI curated by Elastic Security Labs.</p>
<p>Read the <a href="http://www.elastic.co/cn/blog/elastic-global-threat-2024">announcement</a> and <a href="https://www.elastic.co/cn/resources/security/report/global-threat-report">download</a> the 2024 Elastic Global Threat Report to gain an in-depth understanding of the threat landscape.</p>]]></content:encoded>
            <category>security-labs</category>
            <enclosure url="https://www.elastic.co/cn/security-labs/assets/images/elastic-publishes-2024-gtr/2024-gtr.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Fall 2023 Global Threat Report Outro]]></title>
            <link>https://www.elastic.co/cn/security-labs/fall-2023-global-threat-report-outro</link>
            <guid>fall-2023-global-threat-report-outro</guid>
            <pubDate>Thu, 19 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[This article highlights the essential contributions to the Global Threat Report from the Security Intelligence team, and describes three major phenomena impacting the threat landscape.]]></description>
            <content:encoded><![CDATA[<p>After months of diligent work, Elastic Security Labs is excited to announce the publication of the <a href="https://www.elastic.co/cn/explore/security-without-limits/2023-global-threat-report">October 2023 Global Threat Report</a>. For our second annual publication of this kind, we knew it was going to be a greater effort– not only did the volume of events increase more than 1000%, we had entirely new types and depth of visibility from features released since our inaugural report.</p>
<p>It goes without saying (but let’s say it for good measure) that none of this would be possible without our users sharing more than one billion security events each year with us. And it certainly wouldn’t be possible without our Elastic colleagues who make our powerful world-spanning capability.</p>
<p>One essential contributor is the Threat Research and Detection Engineering team (TRaDE), who develop features like rules and investigation guides, and assigned the legendary <a href="https://twitter.com/_xDeJesus">Terrance DeJesus</a>. Terrance was instrumental in creating the inaugural report, applying his <a href="https://www.elastic.co/cn/security-labs/google-workspace-attack-surface-part-one">cloud attack surface expertise</a> and security operations experience to this process. Another crucial team is Security Data Analytics (SDA), which is responsible for all the systems that enable us to analyze telemetry. <a href="https://twitter.com/c_donaher">Chris Donaher</a> leads SDA by day (also by night, technically), and helped us comb through hundreds of millions of events this year.</p>
<p>The work from these teams and the rest of Elastic Security Labs shows our commitment to providing security teams with actionable intelligence about threat phenomena so they can better prepare for, resist, and evict threats. By democratizing access to knowledge and resources, including publications like the Global Threat Report, we hope to demonstrate a more effective way to improve security outcomes. We’re more secure together and we can’t succeed without each other.</p>
<p>In our observations, we identified the following factors as reactions to security innovations that are making environments hostile to threats:</p>
<ul>
<li>Heavy adversary investments in defense evasion like using built-in execution proxies to run malicious code, masquerading as legitimate software, and software supply-chain compromise</li>
<li>Significant research devoted to bypassing, tampering with, or disabling security instrumentation</li>
<li>Increased reliance on credential theft to enable business email and cloud-resource compromise, places where endpoint visibility is not generally available</li>
</ul>
<h3>Defense Evasion</h3>
<p>During the development of our inaugural Global Threat Report last year, we were surprised to see how often adversaries used a defense evasion capability regardless of the industry or region they targeted. After analyzing events from thousands of different environments all over the world, we better understood that defense evasion was a reaction to the state of security. It was a trend we saw again this year, just one of several forces shaping the threat landscape today.</p>
<p>More than 43% of the techniques and procedures we observed this year were forms of defense evasion, with <a href="https://attack.mitre.org/techniques/T1218/">System Binary Proxy Execution</a> representing almost half of those events. These utilities are present on all operating systems and facilitate code execution– some common examples include software that interprets scripts, launches DLLs, and executes web content.</p>
<p><img src="https://www.elastic.co/cn/security-labs/assets/images/fall-2023-global-threat-report-outro/image2.png" alt="Figure 1. Top defense evasion techniques" /></p>
<p><a href="https://www.elastic.co/cn/security-labs/revisiting-blister-new-developments-of-the-blister-loader">BLISTER</a>, which is a malware loader associated with financially-motivated intrusions, relied on the <em>rundll32.exe</em> proxy built into every version of Microsoft Windows to launch their backdoor this year. The BLISTER loader is a useful example because its authors invested a great deal of energy encrypting and obfuscating their malicious code inside a benign application. They fraudulently signed their “franken-payload” to ensure human and machine mitigations didn’t interfere.</p>
<h3>Endpoint tampering</h3>
<p>This year we also saw the popularity of Bring Your Own Vulnerable Driver (BYOVD), which was <a href="https://www.elastic.co/cn/security-labs/forget-vulnerable-drivers-admin-is-all-you-need">described</a> by <a href="https://twitter.com/GabrielLandau">Gabe Landau</a> in a recent publication and provides a way to load an exploitable driver on Windows systems. Drivers run with system-level privileges but what’s more interesting is how vulnerable drivers can be used to disable or <a href="https://thehackernews.com/2023/04/ransomware-hackers-using-aukill-tool-to.html">tamper with security tools</a>. It won’t be long before more adversaries pivot from using this capability to launch malware and instead use it to uninstall security sensors.</p>
<p>To see this in action, look no further than your friendly neighborhood ransomware-as-a-service ecosystem. SOCGHOLISH, the group associated with BLISTER coincidentally, is one of multitudes that grew out of startup digs and became a criminal enterprise. Most of the ransomware we see is related to these kinds of services– and even as one gets disrupted it seems another is always emerging to take its place.</p>
<p><img src="https://www.elastic.co/cn/security-labs/assets/images/fall-2023-global-threat-report-outro/image1.png" alt="Figure 2. Most frequently seen ransomware infections" /></p>
<p>This is, in a very literal sense, a human phenomenon. Threats that endure periods of security innovation and disruption seem to do so by learning not to be caught, and one strategy of mature threats is to move edge-ward to Internet-facing systems, network devices, appliances, or cloud platforms where visibility is less mature. Consider the cost and relative risk of the following options: develop a feature-rich multiplatform implant with purposeful capabilities or purchase account credentials from a broker.</p>
<h3>Credential Access</h3>
<p>Although only about 7% of the data we analyzed involved one form of credential theft or another, 80% of those leveraged built-in operating system features. With functioning stolen credentials, many threat groups can directly interact with an enterprise’s critical data to access email, steal intellectual property, or deploy cloud resources.</p>
<p><img src="https://www.elastic.co/cn/security-labs/assets/images/fall-2023-global-threat-report-outro/image3.png" alt="Figure 3. Commonly seen credential access techniques" /></p>
<p>Abusing stolen credentials has more utility today than ever before, given the widespread adoption of cloud for storage, productivity, code management, and authentication to third party services. For those threats that prioritize a low profile over other goals, credential theft is a shortcut with low exposure.</p>
<p>Insights like these, and many others, can be found in the 2023 Global Threat Report along with forecasts and threat profiles. Elastic Security Labs shares <a href="https://www.elastic.co/cn/security-labs/disclosing-the-bloodalchemy-backdoor">malware research</a>, <a href="https://www.elastic.co/cn/security-labs/unpacking-icedid">tools</a>, <a href="https://www.elastic.co/cn/security-labs/inital-research-of-jokerspy">intelligence analyses</a>, as well as <a href="https://www.elastic.co/cn/security-labs/peeling-back-the-curtain-with-call-stacks">detection science</a> and <a href="https://www.elastic.co/cn/security-labs/accelerating-elastic-detection-tradecraft-with-llms">machine learning/artificial intelligence</a> research.</p>
<p>You can <a href="https://www.elastic.co/cn/explore/security-without-limits/2023-global-threat-report">download the report</a> or check out our <a href="http://elastic.co/gtr">other assets</a>. Reach out to us on <a href="https://twitter.com/elasticseclabs">X</a> and get a deeper dive on the GTR results with our webinar <a href="https://www.elastic.co/cn/virtual-events/insights-from-the-2023-elastic-global-threat-report">Prepare for tomorrow: Insights from the 2023 Elastic Global Threat Report</a>.</p>]]></content:encoded>
            <category>security-labs</category>
            <enclosure url="https://www.elastic.co/cn/security-labs/assets/images/fall-2023-global-threat-report-outro/image4.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Now available: The LLM safety assessment]]></title>
            <link>https://www.elastic.co/cn/security-labs/elastic-security-labs-releases-llm-safety-report</link>
            <guid>elastic-security-labs-releases-llm-safety-report</guid>
            <pubDate>Sat, 06 May 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[Check out the newest report from Elastic Security Labs, which explores how you can protect your organization from LLM threats.]]></description>
            <content:encoded><![CDATA[<p>Today Elastic Security Labs publishes our <a href="https://www.elastic.co/cn/security/llm-safety-report?utm_source=labshome">LLM safety assessment report</a>, a research endeavor meant to collect and clarify information about practical threats to large language models. These forms of generative AI are likely to become ubiquitous in the near future-- but we need to consider the security of them <strong>a little sooner</strong> than that.</p>
<p>One of the most immediate and significant challenges-- and this is true of every new data source-- is understanding the properties and characteristics of the data, if it exists. You can read more about that process in this <a href="https://www.elastic.co/cn/security-labs/embedding-security-in-llm-workflows">excellent</a> <a href="https://www.elastic.co/cn/security-labs/elastic-advances-llm-security">pair</a> of articles, which speak to a challenge many detection engineers are facing today.</p>
<p>New data sources are problematic in a unique way: with no visibility to rank malicious techniques by popularity, how does a detection engineer determine the most effective detections? Mapping fields and normalizing a data source is a good <strong>initial</strong> step that makes it possible to begin investigating; it's exciting to be a little closer to the answer today than we were yesterday.</p>
<p>Check out the new report, browse our <a href="https://www.elastic.co/cn/security-labs/topics/generative-ai">prior research</a> on this topic, and join us in preparing for tomorrow.</p>]]></content:encoded>
            <category>security-labs</category>
            <enclosure url="https://www.elastic.co/cn/security-labs/assets/images/elastic-security-labs-releases-llm-safety-report/image1.png" length="0" type="image/png"/>
        </item>
        <item>
            <title><![CDATA[Elastic publishes 2023 Global Threat Report Spring Edition]]></title>
            <link>https://www.elastic.co/cn/security-labs/elastic-publishes-2023-global-threat-report-spring-edition</link>
            <guid>elastic-publishes-2023-global-threat-report-spring-edition</guid>
            <pubDate>Fri, 28 Apr 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[This week, we’re publishing a new version of this report that’s online and interactive, which includes additional data covering the remainder of 2022, written using Elastic technologies.]]></description>
            <content:encoded><![CDATA[<p>Last November, Elastic <a href="https://www.elastic.co/cn/security-labs/2022-elastic-global-threat-report-announcement">published</a> our inaugural global threat report: a summary of threat trends, forecasts, and recommendations based on analyzing millions of telemetry events shared by users around the world. This report is an important part of our continued commitment to transparency, our mission to protect the world's data, as well as a snapshot of our global threat visibility.</p>
<p>This week, we’re publishing a new version of this report that’s <a href="https://ela.st/gtr">online</a> and interactive, which includes additional data covering the remainder of 2022, written using Elastic. We’d like to offer a few thoughts on this interactive report and share findings both forecasted and unexpected. Let’s take a look at the 2023 Global Threat Report Spring edition!</p>
<p><img src="https://www.elastic.co/cn/security-labs/assets/images/elastic-publishes-2023-global-threat-report-spring-edition/image1.png" alt="Elastic Global Threat Report Spring Edition" /></p>
<p>First, let’s talk about malware: - We observed consistent trends throughout 2022, with the same approximate ratios of different malware types in all geographies - Trojans, cryptominers, and ransomware held the top spots - Linux and Windows continued to see higher rates of malware than MacOS</p>
<p>Next, consider these cloud observations: - Credential access attempts beat out every other tactic for Microsoft Azure, Google Cloud, and AWS as forecast - Brute force techniques remained steady along with token theft</p>
<p>But there were also a few new findings: - Impairing defenses by tampering with cloud logging functionality was one of the most common techniques we observed in the later part of 2022 and continues into 2023 - This likely impacted visibility of other techniques due to missing data sources, and is potentially a reaction to improvements in cloud logging - XMRig prevalence exploded on MacOS, likely as a result of macroeconomic conditions</p>
<p>As excited as we are to begin work on the <em>next</em> Elastic Global Threat Report and review how well we forecasted 2023, it’s been energizing to close out the 2022 calendar year with a few surprises. Defense evasion is still the top tactic for endpoint, credential access is still king of cloud, and malware trends have stayed pretty consistent. <a href="https://ela.st/gtr">Check it out</a> yourself and learn a little bit about how Elastic’s Canvas technology simplifies visualization.</p>
<p>If you’re attending RSAC 2023 come visit us at booth #5879, and don’t forget to follow @elasticseclabs on Twitter.</p>
]]></content:encoded>
            <category>security-labs</category>
            <enclosure url="https://www.elastic.co/cn/security-labs/assets/images/elastic-publishes-2023-global-threat-report-spring-edition/download_(1).jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[2022 Elastic Global Threat Report Announcement]]></title>
            <link>https://www.elastic.co/cn/security-labs/2022-elastic-global-threat-report-announcement</link>
            <guid>2022-elastic-global-threat-report-announcement</guid>
            <pubDate>Wed, 30 Nov 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[Discover our latest findings & strategic recommendations to better stay informed of potential directions threat actors may focus on.]]></description>
            <content:encoded><![CDATA[<p>Today Elastic Security Labs celebrates another milestone: launching the <a href="https://www.elastic.co/cn/explore/security-without-limits/global-threat-report">2022 Elastic Global Threat Report</a>, our inaugural summary of threat trends, forecasts, and recommendations. We analyzed millions of telemetry events from sources around the world to share these insights with you; all part of our continued commitment to transparency, and our mission to protect the world's data.</p>
<p>You can find the report <a href="https://www.elastic.co/cn/explore/security-without-limits/global-threat-report">here</a>, we're excited to share it with you.</p>
]]></content:encoded>
            <category>security-labs</category>
            <enclosure url="https://www.elastic.co/cn/security-labs/assets/images/2022-elastic-global-threat-report-announcement/gtr-blog-image-720x420.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[2022 Elastic Global Threat Report: Helping security leaders navigate today’s threat landscape]]></title>
            <link>https://www.elastic.co/cn/security-labs/2022-elastic-global-threat-report-helping-security-leaders-navigate-todays-threat-landscape</link>
            <guid>2022-elastic-global-threat-report-helping-security-leaders-navigate-todays-threat-landscape</guid>
            <pubDate>Wed, 30 Nov 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[A significant percentage of all cyber threats achieve a degree of success against technical, procedural, and human mitigations. So what is a company to do in the face of such unfavorable odds? Find out in this article.]]></description>
            <content:encoded><![CDATA[<p>As the threat landscape continues to evolve, cybersecurity stakes are growing exponentially higher for today’s organizations. Between Log4j, geopolitical tension, and increasing ransomware threats, security is not just at the top of the business agenda but also the societal agenda. Meanwhile, threat actors have adopted new capabilities and methods while increasing their cadence of activity.</p>
<p>Threat detection and response has come a long way since the firewall dissolved and the cloud took center stage. AI and machine learning, for example, have been major contributors to the advancement of cybersecurity. Machine learning is being used to identify malicious behavior from bad actors by modeling network behavior and improving overall threat detection.</p>
<p>What’s been difficult is the sea of sameness filled with vendors promising products to mitigate today’s threats while preparing for the next one. As the <a href="https://www.elastic.co/cn/explore/security-without-limits/global-threat-report">2022 Elastic Global Threat Report</a> outlines, a significant percentage of all threats achieve a degree of success against technical, procedural, and human mitigations. So what is a company to do in the face of such unfavorable odds? At Elastic, we believe there are several ingredients that are critical to managing today’s threat landscape.</p>
<h2>Build a program, not just a tool</h2>
<p>Vendors need to start thinking about security products as more than software. They are part of a living, breathing program that takes care and feeding. For Elastic, it’s not just about shipping a solution; it’s about offering a holistic approach to security that happens to come with a great product. It’s sharing insights and best practices and creating a community focused on security data intelligence that extends the value of Elastic Security for customers.</p>
<p>The 2022 Elastic Threat Report is an important part of that program, and we’re excited to share our knowledge with the community. In addition to vital information from the Elastic Security Labs team, the report provides actionable guidance to security practitioners about how to maximize positive outcomes for their organizations.</p>
<h2>It takes an (open) community</h2>
<p>The foundation of any good program is a strong community that can support and foster it. Take Elastic’s commitment to open security, for example. The community born from vendors being transparent about their security controls, detection rules, and threat logic can be a force multiplier of best practices across the entire industry.</p>
<p>When vendors engage their experts with experts from across the broader security community about new threats they’ve observed or innovative methods for detecting nuanced attacks, it creates greater scalability of system defenses — not just for the enterprise but also for their customers.</p>
<p>For example, at Elastic we recently opened our Endpoint Security <a href="https://github.com/elastic/protections-artifacts">protections-artifacts repo</a>, adding to our already open <a href="https://github.com/elastic/detection-rules/tree/main/rules">detection-rules repo</a>, to foster further collaboration with our community and be transparent about how we protect users.</p>
<h2>Treat the cause, not the symptom</h2>
<p>Despite the ever-growing threat landscape and the risks that it poses, many organizations are still treating security symptoms instead of the cause. Companies can no longer afford to keep the security team siloed and separate from the engineering team. The two functions must work closely to build products and solutions that can withstand the barrage of advancing threats.</p>
<p>At Elastic, we design and build products with security in mind from the start, so it’s baked into every solution we ship to our customers. In fact, we take security so seriously that the office of InfoSec is part of the engineering organization.</p>
<p>We hope that the 2022 Elastic Global Threat Report will help your understanding of the important shifts in the threat landscape, and provide the information you need to make your organization more resilient, prepared, and protected.</p>
<p><a href="https://www.elastic.co/cn/explore/security-without-limits/global-threat-report">Download the 2022 Elastic Global Threat Report</a>.</p>
]]></content:encoded>
            <category>security-labs</category>
            <enclosure url="https://www.elastic.co/cn/security-labs/assets/images/2022-elastic-global-threat-report-helping-security-leaders-navigate-todays-threat-landscape/gtr-blog-image-720x420.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Behind the scenes: The making of a Global Threat Report]]></title>
            <link>https://www.elastic.co/cn/security-labs/behind-the-scenes-global-threat-report</link>
            <guid>behind-the-scenes-global-threat-report</guid>
            <pubDate>Wed, 30 Nov 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[What was our approach and process for creating a global threat report?]]></description>
            <content:encoded><![CDATA[<p>The first <a href="https://www.elastic.co/cn/explore/security-without-limits/global-threat-report">Elastic Global Threat Report</a> was published earlier this week. In it, you will learn about trends observed by our threat researchers, our predictions for what’s coming next, and some of our recommendations to operate securely in the face of today’s and tomorrow’s threats. If you haven’t read it yet, go <a href="https://www.elastic.co/cn/explore/security-without-limits/global-threat-report">check it out</a>.</p>
<p>As a technical leader in <a href="http://www.elastic.co/cn/security">Elastic Security</a>, I'd like to reveal a small amount about what goes into reports like this one and why it’s significant.</p>
<h2>Why did we do it?</h2>
<p>If you didn’t already know this, you know it now: Elastic is a security company. We are also different — we’re open and transparent. We share exactly how our detections and preventions work in the <a href="https://github.com/elastic/protections-artifacts">protections-artifacts</a> and <a href="https://github.com/elastic/detection-rules">detection-rules</a> repos. We’ve launched <a href="https://www.elastic.co/cn/security-labs/">Elastic Security Labs</a> and regularly publish our research, discoveries, and tools. Anyone can spin up a <a href="https://cloud.elastic.co/registration">trial</a> and try all our features — no barriers, no sales BS. This report is another way we’re bringing transparency to you. We want to empower you by sharing what we know and what we think is coming, and we will continue to expand the scope of what we share in the coming months.</p>
<h2>How'd we do it?</h2>
<p>Put simply, by analyzing a vast amount of data. Behind <a href="http://www.elastic.co/cn/security-labs">Elastic Security Labs</a> is a large team of malware and intelligence analysts, security engineers, researchers, data scientists, and other experts. This team builds and maintains all the protection features in Elastic’s security products: blocking malware, in-memory threats, ransomware, and other malicious behaviors. You name it, we do it. To do this effectively, we need visibility into how our features perform and what threats they’re coming in contact with. We get that visibility through anonymous telemetry shared with us by our users (as well as through research our team carries out on threat feeds and other public datasets).</p>
<p>Our researchers are in the telemetry data daily. Usually, we are focused on the performance of particular features, eliminating false positives and adding protection against emergent techniques, some of which you can learn about in our <a href="https://www.elastic.co/cn/explore/security-without-limits/global-threat-report">threat report</a>. This battle never ends, and we don’t anticipate that changing any time soon.</p>
<h2>Why now?</h2>
<p>As our user base rapidly grew over the past year, we came to the conclusion that we now observe a significant percentage of all threats. Upon hitting that critical mass, we decided to peel off some of our best researchers to zoom out, analyze the totality of what we’ve seen, and determine if we had a story worth sharing. We felt we probably had something to contribute to the community’s collective understanding of the threat landscape, and as you read the report, we hope you agree that we were right to think that.</p>
<h2>Diving deeper</h2>
<p>With that backdrop, I can share a bit more about how a report like this comes to be. Under the leadership of <a href="https://twitter.com/_devonkerr_">Devon Kerr</a>, we built an eight-week plan to analyze and summarize the telemetry coming in from our various features. All our event telemetry data lives in Elasticsearch, which makes for straightforward summarization and visualization.</p>
<p>Data normalization was a significant challenge. This included filtering out excessively noisy endpoints so results aren’t skewed, ignoring data from test clusters, ignoring alerts for data which we later realized were false positives, pulling together signals from our full <a href="http://www.elastic.co/cn/security">Elastic Security</a> solution, and more. It wasn’t the most glamorous work in the world, but it was foundational to producing meaningful results at the end. We’ll plan for a couple weeks in this phase again next time — it will always be a significant lift.</p>
<p>Once the data was in good shape, we extracted the meaning from raw aggregations of a massive number of events to determine insights worth sharing, which help us understand the present state of the threat landscape. In particular, we wanted to explain the most prevalent threats we're seeing and put them in context. These are patterns that ebb and flow throughout the year, making an annual overview particularly useful for spotting the threats making the biggest impact. This led to the various charts and statistics laid out in the report. It took us a couple weeks to settle on a list among the team.</p>
<p>Next, we had to write. Devon, <a href="https://twitter.com/andythevariable">Andy Pease</a>, <a href="https://twitter.com/DanielStepanic">Daniel Stepanic</a>, and <a href="https://twitter.com/_xDeJesus">Terrance DeJesus</a> did the heavy lifting here. Anyone who’s done technical writing knows how important clarity and conciseness are in delivering a message that can be understood by the general public. A few dozen pages came together in a way we’re proud of. Importantly, we partnered closely with <a href="https://www.linkedin.com/in/pateldhrumil/">Dhrumil Patel</a>, our product management lead, and <a href="https://twitter.com/jellard8">Jen Ellard,</a> security product marketing lead, for the <a href="https://www.elastic.co/cn/explore/security-without-limits/global-threat-report">Threat Report</a> effort to make sure our points were clear and meaningful to our user base.</p>
<p>All of that brought us to the end of our eight week plan to develop the report. By late August, we were largely pencils-down on the content but far from done. We’re lucky to have a team of designers at Elastic to help us transform a wall of text in a Google doc into a PDF with style and graphics to enhance meaning and help our conclusions and recommendations jump off the page. We knew that this process would take time, many drafts, and a lot of back and forth. Planning and executing this piece of the project took about as long as the data gathering, analysis, and writing. We learned a lot about how long it takes to go from completed draft to final copy and will involve our internal partners early and often in the process.</p>
<h2>Tell us what you think</h2>
<p>We’d love to hear your feedback about the first <a href="https://www.elastic.co/cn/explore/security-without-limits/global-threat-report">Elastic Global Threat Report</a>. More is on the way. We expect to make this an annual publication, and between now and then we’re hoping to deliver a more interactive version of this inaugural report.</p>
]]></content:encoded>
            <category>security-labs</category>
            <enclosure url="https://www.elastic.co/cn/security-labs/assets/images/behind-the-scenes-global-threat-report/gtr-blog-image-720x420.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Sneak Peek: Elastic’s 2022 Global Threat Report]]></title>
            <link>https://www.elastic.co/cn/security-labs/sneak-peek-elastic-2022-global-threat-report</link>
            <guid>sneak-peek-elastic-2022-global-threat-report</guid>
            <pubDate>Wed, 30 Nov 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[Elastic Security Labs has compiled the 2022 Global Threat Report to share trends and tactics adversaries and attack groups use, as observed by our threat research team and broader user community over the past year.]]></description>
            <content:encoded><![CDATA[<p>The <a href="http://www.elastic.co/cn/security-labs">Elastic Security Labs</a> team is passionate about securing the world’s data from attack, and strives to raise the bar within the security industry. To this end, Elastic Security Labs has compiled the <a href="https://www.elastic.co/cn/explore/security-without-limits/global-threat-report">2022 Global Threat Report</a> to share trends and tactics adversaries and attack groups use, as observed by our threat research team and broader user community over the past year.</p>
<p>Let’s dig into a few of the endpoint related findings:</p>
<ol>
<li>
<p>72% of all defense evasion techniques consisted of masquerading and system binary proxy execution</p>
</li>
<li>
<p>~77% of all credential access techniques are attributed to OS credential dumping with commonly known utilities</p>
</li>
</ol>
<p>Here’s a chart on how the endpoint techniques breakdown across our data set.</p>
<p><img src="https://www.elastic.co/cn/security-labs/assets/images/sneak-peek-elastic-2022-global-threat-report/image1.png" alt="" /></p>
<p>This was just a preview of the research coming your way. We have lots of findings and recommendations coming your way soon. Stay tuned to <a href="http://www.elastic.co/cn/security-labs">Elastic Security Labs</a> for the <a href="https://www.elastic.co/cn/explore/security-without-limits/global-threat-report">2022 Elastic Global Threat Report</a>.</p>
]]></content:encoded>
            <category>security-labs</category>
            <enclosure url="https://www.elastic.co/cn/security-labs/assets/images/sneak-peek-elastic-2022-global-threat-report/blog-open-security-720x420-B.jpg" length="0" type="image/jpg"/>
        </item>
    </channel>
</rss>