Network Threats

  • 'Theory of Self-Reprducing Automata' published.

    Paper published by John von Nuemann believed to be foundation of study of viruses
  • The Creeper - first virus written

    Bob Thomas, created the first virus called the Creeper. The Creeper was self-contained.
  • The Reaper - first antivirus developed

    Ray Tomlinson, colleague to Bob Thomas (creator of the first virus, The Creeper) developed the first antivirus ,the Reaper to eradicate the Creeper. Like the Creeper, the Reaper was self-contained.
  • Period: to

    Emergence of black hat hackers

    During the 1980s and 1990s, the term hackers became associated for criminal activity. The origin of 'black hat hacker' was attributed to Richard Stallman.
  • Whte Hat Hacking in The New York Times

    NYT described white hat activities as part of a "mischievous but perversely positive 'hacker' tradition".
  • Elk Cloner - first virus spread 'in the wild'

    First virus spread in the wild. Targeted Apple II computers.
  • Brain - First PC Virus

    First PC virus in the wild, Brain, was discovered in 1986.
  • First commercial use antivirus

    McAfee, G Data, and ESET all create first antivirus software in 1987.
  • The AIDS Trogan - The first ransomware

    Created by Joseph Popp, AIDS trojan was the first ransomware. Once installed, it would count each time you booted up your computer, and after 90 times, it would hide all of your files and demand a letter with $189 to "renew your license".
  • Firewall was born

    Packet filtering firewalls were born.
  • Firewall changes for good.

    An Isreali based security company released the world's first stateful inspections based firewall
  • Mainstream growth for firewalls

    Stateful inspection firewalls became much more mainstream and supported VPN and other functions.
  • 'Ethical hacking' was first used by IBM Vice President, John Patrick.

    Although the concept has been around longer, the phrase 'ethical hacking' was first used in 1995 by John Patrick, IBM Vice President at the time.
  • Melissa - The first social engineering attack

    The first email based virus, Melissa, was the first to use social engineering.
  • Period: to

    Intrusion Detection preferred over Intrusion Prevention

  • UTM Introduction

    The unified threat management (UTM) theory was introduced. This combined traditional firewalls, intrusion detection, antivirus, email filtering, and other functions into a firewall.
  • GPCoder and Archievus - Ransomware

    The internet offers new opportunities to ransomware.
  • The Adoption of Intrustion Prevention Systems

  • Period: to

    Adoption of Faster Combined IDS/IPS

  • Next Generation Firewall (NGFW) Introduction

    NGFW focused on performance degradation when enabling multiple functions and also allowed for better management of users.
  • Vundo - Ransomware

    First example of attackers file encryption and attackers demanding money for decryption.
  • Trojan Winlock

    First example of locker ransomware.
  • Period: to

    Next Generation IPS

  • Emergence of CryptoLocker

    Stronger Encryption: The emergence of CryptoLocker.
  • Wannacry and Petya

    First global campaigns of ransomware.
  • Server-defined Firewall Introduced

    First purpose-built internal firewall. Stateful layer 7 firewall protection to prevent lateral movement and other attack vectors specific to internal network of on-premise, hybrid, and multi-cloud environments.