More Sophisticated Cyber Attacks Will Dominate 2019: Trend Micro

Aadhya Khatri - Jan 01, 2019


More Sophisticated Cyber Attacks Will Dominate 2019: Trend Micro

According to Trend Micro, more sophisticated cyber attacks will dominate in the upcoming year with Cloud attracting the most attention.

According to Trend Micro, a cyber-security firm, the cybercriminals will make use of more complex means in 2019. Their prey is Cloud and other technology environments for corporations. The company attributes this trend to the change of the technology landscape.Fotolia 164586542 M Gorodenkoff 1

The cybercriminals will take advantage of the some known methods to answer to the increasing adaptation of Cloud. Weak security measures and Cloud will make way for the attackers to exploit accounts for mining cryptocurrency.

Greg Young, Trend Micro’s Vice President of Cybersecurity, warned corporations on the risk of using Cloud. This adoption covers both OT and IT and supports more convenient the practice of working remotely. The criminals will make a profit by abusing flaws, stealing credentials, and social engineering.

The company’s report also urges organizations which have Cloud-based activities to put more resources into educating their staff on how to protect themselves and vital information online. It emphasized the importance of this timely act while the number of cyber attack cases is on the rise and corporate offensive comes to light.

Since 2015, phishing URL number blocked by Trend Micro has risen by close to 3,800 percent. Furthermore, the report also added that hackers will remain relying on known vulnerabilities that have not been patched in corporate networks for 99.99 percent of exploits because it is still a useful tactic for them with a very high success rate.

The company’s Vice President for India and South Asia Nilesh Jain added that there was no such thing as a silver bullet, a general solution to all problems with cybersecurity so enterprises should not waste their time and effort finding one like that. In this case, a defense method comprising of different techniques which can complement one another is a better way to go.

According to the report, BEC attacks (short for Business Email Compromise) is on the criminals’ radar. They will put an emphasis on staff who works directly with C-level executives, which can cause massive losses.

Comments

Sort by Newest | Popular