Post by account_disabled on Jan 1, 2024 1:25:59 GMT -7
At this time, every year I compile all of my latest research on cybercrime trends. Threat research including the development of various related technologies It comes out as a report to Fortinet. It reflects what the cybersecurity landscape will look like both in the short term and in the future. I think it's important to look at the bigger picture and make these predictions. This is because the cybercriminal community has been successful in their threats. By relying on more accurate predictions of victims' decisions. and make more use of network connections Therefore, more threats were found. Cybercriminals use tactics "All forms of attack" are used in their attacks. As a result, we have seen the development of more sophisticated attack methods. For example, we have seen a marked increase in the use of Advanced Evasion Techniques (AETs). This popular technique is designed with the intent of being able to prevent detection. You can also turn off security functions and equipment. They can also operate undetected. However, we are noticing additional strategies used by cybercriminals.
The first strategy is that, like most organizations, They won't spend money if they don't need it or don't want it, for example, according to Fortinet's latest Cyber Security Landscape Threat Report. It shows that cybercriminals can target vulnerabilities from the 2010s. 2007 was more than in 2007. 2018-2019, thus cybercriminals do not need to invest in developing new malware tools. This is when organizations still have low levels of protection for their networks. There is still a high opportunity for threats. Another strategy used is to target Telegram Number Data the largest number of attacks, as the same report found. Criminals are targeting edge services that is more connected to the public This may be an opportunity as organizations are actively upgrading their email security gateways and training their personnel to combat the growing threat of phishing. Criminals are therefore using a large number of different attack strategies. and successfully invaded the network And what's most interesting right now is the development of attack strategies that use swarm-based attacks, which I've been reporting on for a while now. that can be customized and are grouped together according to specific attack functions.
This new group of intelligent worms will be able to share and learn from each other in real time. Can set target network and attack the victim In every aspect simultaneously easily. Therefore, it is a challenge for the network's potential to be able to defend itself strongly. Who has an advantage? It is imperative that organizations understand these trends. This is because in cyber competition the criminal community often has an advantage. This is especially true as organizations around the world continue to rely on Traditional point products and Stovepiped security strategies. Organizations need to adapt. The overall vision for how organizations should think about and implement cyber security systems. Until now Some organizations are still using traditional, ineffective strategies to protect their new networks, such as using separate security tools to manage their networks in the cloud. This is considered to be an inappropriate strategy being used. As separate devices add complexity and additional burden to IT staff. It also reduces visibility into the network and reduces the network management power needed to discover and stop high-volume attacks. that malicious actors have designed to exploit many specific vulnerabilities.
The first strategy is that, like most organizations, They won't spend money if they don't need it or don't want it, for example, according to Fortinet's latest Cyber Security Landscape Threat Report. It shows that cybercriminals can target vulnerabilities from the 2010s. 2007 was more than in 2007. 2018-2019, thus cybercriminals do not need to invest in developing new malware tools. This is when organizations still have low levels of protection for their networks. There is still a high opportunity for threats. Another strategy used is to target Telegram Number Data the largest number of attacks, as the same report found. Criminals are targeting edge services that is more connected to the public This may be an opportunity as organizations are actively upgrading their email security gateways and training their personnel to combat the growing threat of phishing. Criminals are therefore using a large number of different attack strategies. and successfully invaded the network And what's most interesting right now is the development of attack strategies that use swarm-based attacks, which I've been reporting on for a while now. that can be customized and are grouped together according to specific attack functions.
This new group of intelligent worms will be able to share and learn from each other in real time. Can set target network and attack the victim In every aspect simultaneously easily. Therefore, it is a challenge for the network's potential to be able to defend itself strongly. Who has an advantage? It is imperative that organizations understand these trends. This is because in cyber competition the criminal community often has an advantage. This is especially true as organizations around the world continue to rely on Traditional point products and Stovepiped security strategies. Organizations need to adapt. The overall vision for how organizations should think about and implement cyber security systems. Until now Some organizations are still using traditional, ineffective strategies to protect their new networks, such as using separate security tools to manage their networks in the cloud. This is considered to be an inappropriate strategy being used. As separate devices add complexity and additional burden to IT staff. It also reduces visibility into the network and reduces the network management power needed to discover and stop high-volume attacks. that malicious actors have designed to exploit many specific vulnerabilities.