Skip to main content

Trends in Credit Card Data Breaches and Why You Should Be Concerned

January 24, 2014

As FishNet Security's Incident Management team handled credit card data breaches, PFIs and other response engagements in 2013, they observed a rise in advanced malware - like W32/Changeup - and sophisticated botnets - like Dexter and Project Hook - that outpaced traditional prevention methods. The trends and lessons learned are compiled in this white paper, in which author Colby Clark, Director of IM, provides detailed information, first-hand insight and skilled commentary on the various phases and aspects of the breach lifecycle.

Topics covered include:

  • Intrusion and Exploitation
  • Collection and Exfiltration
  • Card Usage and Detection Avoidance
  • Detection and Investigation
  • Containment and Remediation
  • Physical Intrusion and Re-Intrusion
  • Supply Chain, Vendor and Employee Attacks
  • Law Enforcement Intervention

Related Blogs

March 14, 2018

Observations on Smoke Tests – Part 1

Smoke testing in the traditional definition is most often used to assess the functionality of key software features to determine if they work or perfo...

See Details

April 23, 2014

INFOGRAPHIC: Making Sense of IAM

Let’s face it, developing an Identity & Access Management (IAM) program can be a complex undertaking that must be tailored to each organization’s uniq...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.


Privacy Policy

Related Insights

June 14, 2017

Incident Management Plan Development

We have the experience and knowledge required to help your organization develop a strong incident management plan.

See Details

January 16, 2018

The Fundamentals of Identity and Access Management

Identity and access management (IAM) is an exciting world filled with dreams of business enablement while reducing risks and implementing security pol...

See Details

January 10, 2012

PCI Compliance – Your First Three Steps to Compliance

We’ve all been there. You are sitting at your desk, minding your own business, and someone drops off a letter addressed to the PCI Compliance Officer....

See Details

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.

Subscribe

Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cyber security Events in your area.