Supply chain attackers taking advantage
With 1 out 61 organizations impacted by ransomware each week, with this stating that supply chain cyber-attacks will become more common and proliferate next year. Expect ransom demanded by hackers to break records next year. Secondly, the Mobile malware attacks will increase, as mobile wallets and mobile payment platforms are used more frequently and the Cryptocurrency is anticipated to become a focal point for cyberattacks, the Check Point cyber security predictions for 2022 says.
Check Point Research believes that supply chain attacks will become more common, and governments will begin to establish regulations to address these attacks and protect networks. They will also look into collaborating with the private sectors as well as other countries to identify and target more threat groups operating on a global and regional scale. Supply chain attackers take advantage of a lack of monitoring within an organization’s environment. They can be used to perform any type of cyber-attack, such as data breaches and malware infections. Going into 2022 we will see an increase in data breaches that will be larger scale. These breaches will also have the potential to cost organizations and governments more to recover.
In May 2021, the US insurance giant paid $40 million in ransom to hackers. This was a record, and we can expect ransom demanded by attackers to increase in 2022.
The report states, as mobile wallets and mobile payment platforms are used more frequently, cybercriminals will evolve and adapt their techniques to exploit the growing reliance on mobile devices. Secondly, Cryptocurrency to become a focal point for cyberattacks globally. As reports of stolen crypto wallets triggered by free airdropped NFTs become more frequent. In 2022, we can expect to see an increase in cryptocurrency-related attacks. Going forward, attackers to leverage vulnerabilities in microservices to launch large scale attacks.
With microservices becoming the leading method for application development, and microservices architecture being embraced by Cloud Service Providers, attackers are using vulnerabilities found in microservices, to launch their attacks. We can also expect to see large-scale attacks targeting CSPs. Secondly, the attackers to weaponize deepfake technologies. Threat actors will use deepfake social engineering attacks to gain permission and access sensitive data. Finally, Penetration tools continue to grow. Hackers will increasingly use penetration tools to customize attacks in real-time and to live and work within victim networks. To stay ahead of threats, organizations must be proactive and leave no part of their attack surface unprotected or unmonitored, or they risk becoming the next victim of sophisticated, targeted attacks.
Micro Focus’ CyberRes partners with Google Cloud for High-Scale secure cloud analytics
CyberRes, a Micro Focus line of business, announced a partnership with Google Cloud to sup...
TeamViewer expands partnership with RealWear
TeamViewer announced a major expansion of its partnership with RealWear, a provider of ass...
Arcserve extends its SaaS Backup offerings
Arcserve announced it has extended its SaaS Backup offering to provide simple, secure, and...
Crayon Software Experts India hosts Crayon Connect CIO Event 2022
Crayon Software Experts India has organized their flagship customer event, the Crayon Conn...
BPE Celebrates 22 years of Trust, Leadership & Success
Best Power Equipments (BPE) celebrated its 22nd anniversary on Saturday, 23 July 2022, at...
India Mobile Congress declares the schedule for 6th edition of the IMC
Hon’ble Minister of Communications, Electronics & Information Technology and Rai...
Neo4j hosts its Graph Data Summit in Bangalore
Neo4j hosted its first ever Graph Summit on July 21 2022 at Ritz Carlton, Bangalore. With...