By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
TechgoonduTechgoondu
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Search
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Reading: Phishing, attacks on cloud entities and ransomware bring new cybersecurity challenges this year
Share
Aa
TechgoonduTechgoondu
Aa
  • Audio-visual
  • Enterprise
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
  • PC
  • Telecom
Search
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Follow US
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Techgoondu > Blog > Cybersecurity > Phishing, attacks on cloud entities and ransomware bring new cybersecurity challenges this year
CybersecurityEnterpriseSoftware

Phishing, attacks on cloud entities and ransomware bring new cybersecurity challenges this year

Grace Chng
Last updated: January 7, 2022 at 4:37 PM
Grace Chng Published January 7, 2022
5 Min Read
SHARE
  • PHOTO: Pixabay

In 2021, cybercrime was more widespread and more sophisticated. Cyber criminals were relentlessly attacking critical infrastructure in healthcare and financial services.

A Microsoft report stated there were 25 different kinds of malicious e-mail techniques in addition to phishing. Cybercriminals do not even have to know IT today. They can buy cyber attack services, added the report.

An attacker-for-hire can be had upwards of US$250 per job, while ransomware kits can be bought for US$66 and a denial-of-service attack can be bought for US$311.88 per month.

As the world steps into 2022, the turmoil over cybersecurity continues. There will be more and bigger threats, and faster threats on the horizon, say cybersecurity experts.

Such attacks will also become increasingly more sophisticated as attackers turn to advanced learning capabilities of artificial intelligence and machine learning to break into IT infrastructure.

Cybersecurity experts point to six leading types of cyber attacks in 2022:   

1. Phishing will continue: It is an effective technique for gaining access to an organisation’s network and systems. The Microsoft report pointed out that phishing was responsible for about 70 per cent of data breaches. Employees can be tricked into handing over sensitive data like login credentials or to download a file that has malware that can stealthily tunnel through an organisation’s network to steal digital assets.  

2. Ransomware will become more sophisticated: They will be more aggressive and adept at dodging security defences. Check Point Software reported an increase of 168 per cent of such attacks in the Asia-Pacific. This will spur other attacks especially when ransomware-as-a-service is readily provided by operators who develop and sell high-quality malware to less sophisticated attackers.

3. Infiltrations of cloud environments will increase: A new focus will be on Linux-based cloud entities, said Bill Swearingen, a security strategist at IronNet, which helps organisations collectively detect, share intelligence and stop security threats in real-time. Splunk’s Distinguished Security Strategist Ryan Kovar predicted that a major cloud provider could be hacked this year, “if it hasn’t happened already”. 

4. Global supply chains will become a new target: They have become critical infrastructure and considered high-value targets by cyber criminals. Often, these companies, especially smaller providers in the supply chain, are good targets because they lack the tools and funding needed to defend themselves, said Amit Sharma, a security engineer at Synopsys.

5. Emerging threat of deep fakes can harm individuals and organisations: The Microsoft report highlighted that improvements in AI allow deepfake videos and audio to be created which can then be used to compromise business e-mail and bypass multi-factor authentication protocols.

6. Crypto platforms, such as exchanges, are attractive “playgrounds”: Interest is growing in cryptocurrency trading, and malicious forces are looking to extract ransom from data heists, as well as profit from manipulating and stealing cryptocurrencies, said Jason Schmitt, general manager of Synopsys’ Software Integrity Group.

Related to this is the many millions of digital wallets sitting unprotected on laptops and smartphones, which also make an easy target for cyber criminals.

Going forward, more international cooperation on cybersecurity will emerge, said Anthony Grenga, IronNet’s vice-president of cyber operations.

Countries have realised that international cooperation is necessary to bolster efforts to create a safer, more secure interoperable cyberspace for everyone, he added.

A step in this direction was taken last year, when Singapore and the United States signed three Memorandums of Understanding to strengthen cyber security cooperation.

Another significant trend is that organisations cannot hide from cyber threats. There is no security perimeter any more, so basic diligence is the new perimeter, said Mick Baccio, Splunk global security advisor.

Organisations have to focus on the bread-and-butter work, the cyber hygiene, he said in Splunk’s Data Security Predictions 2022 report. “It’s patching your systems regularly and quickly, it’s implementing multifactor authentication, it’s the basics, the eat-your-vegetables of cybersecurity.”

This is a view held by Microsoft too. In its report, it said cybersecurity hygiene training remains essential to the prevention of a variety of attacks. It highlighted that awareness of security hygiene by employees protects against 98 per cent of attacks.

You Might Also Like

As TikTok faces a possible ban in the US, should users elsewhere be worried?

Foodpanda to use Gogoro electric scooters in battery swapping trial with Cycle & Carriage

RedCap: A new cellular IoT technology for the 5G era

Debate on computational photography misses what’s real, what’s lived outside a frame

Q&A: Delivering movies digitally and securely from around the world

TAGGED: Check Point Software, cryptocurrency, cyber attack, IronNet, Microsoft, Splunk, supply chain, Synopsys

Sign up for the TG newsletter

Never miss anything again. Get the latest news and analysis in your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Grace Chng January 7, 2022
Share this Article
Facebook Twitter Whatsapp Whatsapp LinkedIn Copy Link Print
Share
Avatar photo
By Grace Chng
Follow:
A seasoned writer, author and industry observer, Grace was the key tech writer for The Straits Times for more than three decades. She co-founded and edited Computer Times, later renamed Digital Life. She helmed this publication, the de facto national IT magazine, for nearly 19 years. Grace is also the editor and co-curator of Intelligent Island: The Untold Story of Singapore’s Tech Journey, a book highlighting Singapore’s ICT development.
Previous Article Intel starts shipping Arc graphics chips, promising new options for PC gamers
Next Article As issues of fairness and sustainability boil over, a developer sabotages his open-source code in protest
Leave a comment

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Stay Connected

Facebook Like
Twitter Follow

Latest News

Oppo Find N2 Flip review: A worthy flip phone alternative to Samsung
Cellphones Mobile March 26, 2023
As TikTok faces a possible ban in the US, should users elsewhere be worried?
Cybersecurity Internet March 24, 2023
Foodpanda to use Gogoro electric scooters in battery swapping trial with Cycle & Carriage
Enterprise Internet March 23, 2023
RedCap: A new cellular IoT technology for the 5G era
Enterprise Software Telecom March 23, 2023
//

Techgoondu.com is published by Goondu Media Pte Ltd, a company registered and based in Singapore.

.

Started in June 2008 by technology journalists and ex-journalists in Singapore who share a common love for all things geeky and digital, the site now includes segments on personal computing, enterprise IT and Internet culture.

banner banner
Everyday DIY
PC needs fixing? Get your hands on with the latest tech tips
READ ON
banner banner
Leaders Q&A
What tomorrow looks like to those at the leading edge today
FIND OUT
banner banner
Advertise with us
Discover unique access and impact with TG custom content
SHOW ME

 

 

POWERED BY READYSPACE
The Techgoondu website is powered by and managed by Readyspace Web Hosting.

TechgoonduTechgoondu
Follow US

© 2023 Goondu Media Pte Ltd. All Rights Reserved | Privacy | Terms of Use | Advertise | About Us | Contact

Join Us!

Never miss anything again. Get the latest news and analysis in your inbox.

Zero spam, Unsubscribe at any time.
 

Loading Comments...
 

    Welcome Back!

    Sign in to your account

    Lost your password?