Showing posts with label security. Show all posts

Tuesday, October 26, 2021

thumbnail

The 9 key security threats that organizations will face in 2022

 

9 key security threats that organizations will face in 2022

For 2021, cybercriminals took advantage of the coronavirus pandemic, the ongoing shift to hybrid work and the vulnerability of organizations to ransomware. For 2022, we can expect more of the same as well as a host of worsening threats to keep us on our toes. A report released Tuesday by cyber threat intelligence provider Check Point looks at some of the security challenges that organizations will likely face next year.
Supply chain attacks will continue to grow. Cyberattacks no longer just impact the targeted organization but often have a ripple effect that harms partners, providers, customers and others along the supply chain. For 2022, Check Point expects that trend to escalate with more data breaches and malware infections. As supply chain attacks become more common, however, governments will start to devise regulations to better protect vulnerable networks. Expect greater collaboration between government officials and the private sector to identify and combat more cybercriminal groups that operate regionally and globally.
The cyber "cold war" will ramp up. The cyber cold war among different nations has been escalating, and that will intensify next year. More nation states and groups operating on their behalf will continue to try to destabilize rival countries and governments. Terrorist groups and activities will take advantage of better infrastructure and greater technological capabilities to launch more sophisticated attacks.

Data breaches will scale up. As data breaches scale up, organizations and governments will be forced to spend more money to recover from them, Check Point says. Following the record $40 million ransom payment paid by insurance giant CNA Financial this year, ransom demands are expected to continue to increase next year.

Misinformation campaigns will flourish. In 2021, misinformation and "fake news" surrounding the coronavirus pandemic and the efficacy of vaccines spread through social media and other venues. As one consequence, Dark Web cybercriminals turned a tidy profit by selling phony vaccine certificates to people who refused to get vaccinated. In 2022, fake news will continue to play a role in phishing campaigns and scams. Plus, expect to see propaganda and misinformation in advance of the US midterm elections in an attempt to influence voters.

Deepfake technology will be weaponized. The tools needed to create fake but convincing videos and audios have become more advanced. Cybercriminals will increasingly use them to steal money, manipulate stock prices and sway the opinions of people via social media, Check Point says. As one example from 2020, attackers used technology to impersonate the voice of a director of a Hong Kong bank to trick a bank manager into transferring $35 million into their account.

Cryptocurrency will play a greater role in attacks. As money becomes more digital, criminals will increasingly find innovative ways to steal it. Following reports of stolen crypto wallets triggered by free airdropped NFTs, Check Point discovered that attackers could steal such wallets by exploiting security flaws. Expect more cryptocurrency-related attacks in 2022.

Criminals will exploit vulnerabilities in microservices. Microservices have become a more common method for application development and one supported by a greater number of cloud service providers (CSPs). But as with any popular trend, cybercriminals are taking advantage of vulnerabilities found in microservices to launch attacks. For 2022, expect more of these attacks targeting CSPs.

Mobile malware attacks will increase. As organizations shifted to remote and hybrid work in 2020 and 2021, criminals increasingly turned to mobile malware as an attack vector. In 2021, almost half of all organizations reviewed by Check Point had at least one employee who downloaded a malicious mobile app. With the growing use of mobile wallets and mobile payment services, attackers will continue to exploit the reliance on mobile devices.

SEE ALSO:  The latest phishing threats used by the  Tech support scams 


Penetration tools will continue to be used in attacks. Though created to help organizations test their security defenses, penetration tools have been exploited by cybercriminals to help them launch more effective attacks. By customizing such tools, hackers have been able to target victims with ransomware. As this tactic continues to catch on, we'll see them used to carry out more data exfiltration and extortion attacks in 2022.

"In 2021, cyber criminals adapted their attack strategy to exploit vaccination mandates, elections and the shift to hybrid working, to target organizations' supply chains and networks to achieve maximum disruption," Check Point Software research VP Maya Horowitz said in a blog post.

"Looking ahead, organizations should remain aware of the risks and ensure that they have the appropriate solutions in place to prevent, without disrupting the normal business flow, the majority of attacks, including the most advanced ones," Horowitz added. "To stay ahead of threats, organizations must be proactive and leave no part of their attack surface unprotected or unmonitored, or they risk becoming the next victim of sophisticated, targeted attacks."


Thanks for reading

CHEERS!
By ken

 



Monday, October 25, 2021

thumbnail

cyber security awareness

 

The latest phishing threats used by the  Tech support scams 

  According to Norton Labs.this scammers try to trick people to believe that there is aserious security crisis with their computers .
You can recieve aphone call, an email,or apop up notification on the web claiming that your computer is at a risk and that some security firm or product is needed to fix the problem
Though such scams seem obvious to people knowledgeable about cyber threats, many people still fall for this type of ploy. In fact, the tech support ruse was the number one scam described by Norton Labs in its new October Consumer Cyber Safety Pulse Report.

In reality, the criminals behind these con games want to steal your personal information, gain access to your bank account or install malware on your PC. Many scammers will employ standard phishing tactics by impersonating the names of major technology companies such as Microsoft, Google and Apple.
They take advantage of the increased need by people to use their devices to juggle hybrid work and home life. They capitalize on FUD (fear, uncertainty, doubt) by trying to frighten people into believing that there's something wrong with their computers. Further, they continue because they work. Norton also expects these scams to take off further as we head into the holiday season.

According to Norton,The best defense against these tech support scams is awareness. so Never call a phone number based on a pop-up notification or warning. Instead, contact the company directly through its website. The same advice holds true for any emails you receive claiming a security problem with your PC. And if you get such a phone call, simply hang up.

Gamers are another audience that cybercriminals like to target. In one particular phishing campaign, attackers went after people who play RuneScape, a popular and free multiplayer online role-playing game. 

To avoid falling for phishing scams, don't click on links from unexpected emails or text messages. Instead, browse to the website of the service listed in the message to contact the company directly if necessary.

Thanks for reading

CHEERS!
By ken

 


Powered by Blogger.

The 20 Richest Programmers in The World

Popular Posts