133rd Day Of Lockdown

Maharashtra45795629935616142 Tamil Nadu2682852087844349 Andhra Pradesh176333956251604 Karnataka145830692722704 Delhi1391561252264033 Uttar Pradesh100310572711817 West Bengal80984568841785 Telangana6894649675563 Gujarat65704485612529 Bihar6203140760349 Assam4816233429115 Rajasthan4667932832732 Haryana3779631226448 Odisha3768124483258 Madhya Pradesh3508225414912 Kerala279561629988 Jammu and Kashmir2239614856417 Punjab1901512491462 Jharkhand140705199129 Chhatisgarh10109761369 Uttarakhand8008484795 Goa7075511460 Tripura5520367528 Puducherry4147253758 Manipur301818147 Himachal Pradesh2879171013 Nagaland24056594 Arunachal Pradesh179011053 Chandigarh120671520 Meghalaya9173305 Sikkim7832971 Mizoram5022820
Technology Other News 11 Dec 2017 Will 2018 cyberattac ...

Will 2018 cyberattacks rely on vulnerabilities?

DECCAN CHRONICLE.
Published Dec 11, 2017, 8:24 pm IST
Updated Dec 11, 2017, 8:24 pm IST
Changing technology landscape will require reliable patch management to block latest threats.
Ransomware will continue to be a mainstay due to its proven success.
 Ransomware will continue to be a mainstay due to its proven success.

This year, cyber attacks continued to plague business leaders, with major breaches occurring due to known vulnerabilities. A report from Trend Micro cybersecurity solutions predicts the trend of known vulnerabilities being used in major attacks will continue in 2018 as corporate attack surfaces expand and expose more security holes. Patch management and employee education should be prioritised for all executives to protect an organisation’s most critical data.

As information technology and operational technology (IT/OT) continue to converge, enterprise applications and platforms will be at risk of manipulation and vulnerabilities, as stated in Trend Micro’s 2018 predictions report. Additionally, it is also predicted that an increase in the Internet of Things vulnerabilities as more devices are manufactured without security regulations or industry standards. Overall, the increased connectivity and enlarged attack surface present new opportunities for cybercriminals to leverage known issues to penetrate a corporate network.

 

Ransomware will continue to be a mainstay due to its proven success. There will be an increase in targeted ransomware attacks, in which the criminals go after a single organisation to disrupt operations and force a larger ransom payout. Business Email Compromise (BEC) attacks will also continue to gain popularity with attackers, as the return on investment for successful attacks is quite high.

“We foresee that the ransomware business model will still be a cybercrime mainstay in 2018, while other forms of digital extortion will gain more ground. The ransomware attacks will manifest itself in a more ‘Specialised’ and ‘Targeted manner’, unlike the earlier approach. With respect to India, in 2018 we will experience a number of attacks targeted at the ATMs, especially malware attacks. We also expect to see a rise in security incidents across Public Cloud platforms,” said Nilesh Jain, Country Manager, India & SAARC, Trend Micro.

 

“We at Trend Micro are constantly scouting out future threats that will have the greatest impact for businesses, and we predict which vulnerabilities will make the biggest waves in the coming year,” said Rik Ferguson, VP of security research for Trend Micro. “Many devastating cyber attacks in 2017 leveraged known vulnerabilities that could have been prevented had they been patched beforehand. This trend will continue next year as corporate attack surfaces expand and expose more security holes. While this remains a challenge for enterprises, executives should prioritise vulnerability management as they make 2018 cybersecurity plans, particularly in the looming shadow of GDPR implementation.”

 

“The private sector continues to be under siege from a variety of cyber threats,” said Edwin Martinez, chief information security officer for CEC Entertainment. “Institutions must continue to share critical information so we can better prevent and respond to these cyber threats limiting exposure to sensitive data.”

Threat actors will also leverage growing technologies, like blockchain and machine learning, to enhance obfuscation against traditional cybersecurity protections. For this reason, the company recommends a layered, cross-generational defence strategy, which combines the latest security techniques with proven tactics that reinforce nearly 30 years of experience protecting some of the biggest global brands.

 

Click on Deccan Chronicle Technology and Science for the latest news and reviews. Follow us on Facebook, Twitter

...




ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT