One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 2975539
Date de publication 2021-06-24 10:00:00 (vue: 2021-06-24 11:05:35)
Titre A mid-year update for Cybersecurity – 4 trends to watch
Texte This blog was written by an independent guest blogger. It is nearing the mid-year point of 2021, and already it can be characterized as” the year of the breach.” Many companies and institutions saw their security perimeters pierced by hackers including the mega-breaches of Solar Winds and the Colonial Pipeline.  The scale of penetration and exfiltration of data by hackers and the implications are emblematic of the urgency for stronger cybersecurity.  Although there are a variety of trends emerging in the first six months, below are four that stand out as barometers of what lies ahead.   1. Ransomware attacks are taking center stage as Cyber-threats There is ample evidence that ransomware has become a preferred method of cyber-attack choice by hackers in 2021. As of May 2021, there has been a 102% surge in ransomware attacks compared to the beginning of 2020, according to a report from Check Point Research. Hackers have found ransomware ideal for exploiting the COVID-19 expanded digital landscape. The transformation of so many companies operating is a digital mode has created many more targets for extortion. One office with 4,000 employees has become 4,000 offices. In addition to an expanding attack surface, hackers are more active than before because they can get paid easier for their extortion via cryptocurrencies that are more difficult for law enforcement to trace. Criminal hacker groups are becoming more sophisticated in their phishing exploits by using machine learning tools. They are also more coordinated among each other sharing on the dark web and dark web forums. In 2020, according to the cybersecurity firm Emsisoft, ransomware gangs attached more than 100 federal, state, and municipal agencies, upwards of 500 health care centers, 1,680 educational institutions and untold thousands of businesses. As a result of the Colonial Pipeline Ransomware attack and others, the U.S. Department of Justice and the FBI have prioritized investigating and prosecuting hackers who deploy ransomware. The impact for the rest of 2021 will be more ransomware attacks against institutions and corporations who are less cyber secure, especially to targets that cannot afford to have operations impeded such as health care, state & local governments, educational institutions, and small and medium sized businesses. See: The New Ransomware Threat: Triple Extortion - Check Point Software Why Ransomware is So Dangerous and Difficult to Prevent | Manufacturing.net 2. Cyber-attacks are a real threat to commerce and economic prosperity So far this year, cyber-attacks have grown in number and sophistication, repeating a trend of the last several years. The recent cycle of major industry and governmental cyber breaches is emblematic of growing risk. The attacks are also becoming more lethal and costly to industry. A new NIST report was released on the economic impact to the U.S. economy by breaches, and it is alarming. The report suggests that the U.S. Loses hundreds of billions to cybercrime, possibly as much as 1 % to 4 % of GDP annually. The beach stats are part of a bigger global trend. The firm Cybersecurity Ventures predicts that global cybercrime damages will reach $6 trillion annually by this end of this year. The firm’s damage cost estimation is based on historical cybercrime figures including recent year-over-year growth, a dramatic increase in hostile nation-state sponsored and organized crime gang hacking activities, and a cyberattack surface. In both the public and private sectors, there is a
Envoyé Oui
Condensat “threat  according  almost  although  it  see:  the 000 100 102 2020 2020: 2021 2025 500 680 ability accelerated according across act acting active activities actors addition address advanced advent adversarial affected affiliated afford against agencies ahead alarming alert algorithms all already also among ample analytics annually anti appealing architectures are arrived artificial as” attached attack attackers attacks audits authentication automate automation average avoid banking barometers based be more beach because become becoming been before beginning being below better bettered between bigger billion billion iot billions blog blogger boardroom both breach breaches brought business businesses bypassing cameras can cannot capacity care center centers chain challenge challenges changing characterized check chest choice colonial com combined commerce communication companies compared complexity composed compromised computers computing concerns congress connected connecting connections connectivity continue controlled conventional coordinated coordination corporations cost costly covid create created crime criminal critical crown cryptocurrencies currently cyber cyberattack cybercrime cybercriminals cybersecurity cybersecurityventures cyberthreats cycle damage damages dangerous dark data daunting decision default department deploy deploying detection determine developed device devices diagnostics differ difficult digital disrupt dramatic each easier easy eccouncil economic economy ecosystem educational effectiveness efficient elevated elevating emblematic emerging employees emsisoft enabled enabling encrypt encryption end endpoints enforcement enhance enhancing environments especially estimates estimation europol even eventually everything evidence evolving exfiltration existing expanded expanding expected exploiting exploits exponential extortion facial factor far faster fbi federal figures filed fileless files firm firm’s first flip focus following forbes forums found four frameworks fraud from from check gang gangs gap gdp get global government governmental governments greatly groups growing grown growth guest guidelines hacker hackers hacking half has have health hide highly historical home horizon hospitals hostile hundreds ideal ill impact impacting impeded imperative implications improvement incident include including increase increased independent industry infected information infrastructure institute instituted institutions integration intelligence intelligent interacting interconnectivity international internet interregional intruders investigating iot iot’s jewels justice kill kinds lack land landscape large larger last latency law learning led less lethal level leveraging lies list living local loosely loses machine magnifies major make making malicious malware management manufacturing many may medium mega mesh method micro mid misuse mitigation mobile mode monitoring months monumental more movement much multi municipal nation nations nearing nearly need net network networks new nist number off offers office offices often one operating operations optimization org organized other others out over paid part passed passwords penetration per person on perimeters phishing physical pierced pipeline point poorly poses possibly predicted predicts preferred present prevent prioritized prioritizing private procedures programs prosecuting prosperity protect provide public purposes rampantly range ransomware rapidly reach real recent recognition released repairing repeating report research rest result risk said saw scale scanning sectors secure secured securing security see: see:  selection self sensors seriousness several sharing sheer should side significant six size sized small software solar sophisticated sophistication special specialized specific speed speeds sponsored spread stage stages stand standards state states stats steganography stocked stronger subsequent such suggests surface surge synergistic systems taking target targe
Tags Ransomware Malware Tool Threat
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: