Follow on Google News News By Tag Industry News News By Location Country(s) Industry News
Follow on Google News | ![]() PandaLabs Predictions for Cybersecurity Trends in 2018 and 2017 Round-upIn another roller-coaster year in cybersecurity PandaLabs have analyzed and neutralized a record quantity of attacks – Targets have changed, techniques have become more sophisticated, attack vectors have multiplied, and the tools are more complex
By: Panda Security The attackers efficiency, effectiveness, and profitability are proven time and again, with up to 75 million distinct malware files created between 1st Jan and 20th Sep 2017, which translates to 285,000 new samples detected every day by PandaLabs. And that is just the malware attacks, 51% of corporate attacks do not use malware. 2017 Cybersecurity Trends More than half of attacks are motivated by financial targets, while espionage is the second greatest motivating factor. Malwareless attacks are increasingly favored by attackers. They prefer to remain invisible to traditional protection models, and do not require the victim's interaction. These attacks can double profitability when optimally executed. Stealth attacks with adaptive lateral movements are becoming all too common. Tools for exploiting vulnerabilities have given rise to new attack vectors that require no human interaction. Ex-employees attempted to extort their previous companies, initiating attacks from within the company. Cyberwarfare and cyber-armies: Figures While there are many more malware samples, each of them is infecting fewer devices individually. Each malware sample will attack a minimum number of devices in order to lower the risk of being detected and thereby achieve its goal. This is supported by the fact that of all the new malware (PE files) never seen before this year (15,107,232) Cybersecurity Predictions for 2018 Cyberwarefare and its consequences: Malwareless hacking attacks: attacks that abuse non-malicious tools or compromised applications to carry out their efforts will increase. More advanced attacks and more ransomware can be expected in the coming year. These attacks promise a high return on their investment at a low level of risk. Companies will spearhead awareness-building initiatives for attacks: for the first time in history, the public will be aware of attacks that happen and are in many cases subsequently covered up, thanks to the new GDPR legislation. Social networks and propaganda: there will be an increase in fake news due to the ability of these platforms to influence public opinion. Facebook, the largest social network in the world, is already taking action on the matter. If it is discovered that a Facebook page repeatedly distributes false news, it will prohibit it from being publicized on the social network. Cryptocurrency: Conclusions Security update protocols should be a priority at all companies. Cases such as WannaCry or Equifax reaffirm this, as every day that passes without patching a vulnerable system puts the company at risk, as well as the integrity of its data, including that of customers and suppliers. Production can be endangered and incur millions in losses. Countries are investing more and more in defensive and offensive capabilities, with a focus on critical infrastructures. 2018 augurs a more dangerous situation. For many professionals, a change of mentality (and strategy) will be necessary to achieve the highest levels of security and protect the assets of their companies' networks. Both in business and at home, training and awareness are key. It follows that cybersecurity, often forgotten by management, will require a greater investment. Having in-depth knowledge of attacks and what they consist of should be the basis for a good defensive strategy. Machine Learning tools and the investigations of Threat Hunting teams are essential to avoid future intrusions. Signature files no longer work and the figures speak for themselves: more than 99% of all malware never appears again anywhere else. There is a problem of focus: solutions that remain focused on fighting against malware (the majority of those available on the market) are doomed to become extinct if they do not change their strategy. And of course, we can't forget international cooperation and the creation of common legislative frameworks such as the GDPR. Having political and economic support and a plan of action will make it possible to benefit from the latest technological advances in the safest manner. In the PandaLabs Annual Report, you can learn about real cases, review the most discussed attacks of 2017, and read more about what lies ahead in 2018. Download the report https://www.pandasecurity.com/ End
|
|