The top 15 cyber threat reports are of a technical nature, and include findings, major incidents, statistics and more. The threat reports are the following:
(1) Malware
Malware is a common type of cyberattack in the form of malicious
software.
(2) Web-based Attacks
Web-based attacks are an attractive method by which threat actors can
delude victims using web systems and services as the threat vector.
(3) Phishing
Phishing is the fraudulent attempt to steal user data such as login
credentials, credit card information, or even money using social
engineering techniques.
(4) Web Application Attacks
Web applications and technologies have become a core part of the
internet by adopting different uses and functionalities. The increase in
the complexity of web application and their widespread services creates
challenges in securing them against threats with diverse motivations
from financial or reputational damage to the theft of critical or personal information
(5) SPAM
Spam consists of sending unsolicited messages in bulk. It is considered a cybersecurity
threat when used as an attack vector to distribute or enable other threats.
(6) Distributed Denial of Service (DDoS)
Distributed Denial of Service (DDoS) attacks are known to occur when
users of a system or service are not able to access the relevant information, services or other resources.
(7) Identity Theft
Identity theft or identify fraud is the illicit use of a victimās personal
identifiable information (PII) by an impostor to impersonate that person and gain a financial advantage and other benefits.
(8) Data Breach
A data breach is a type of cybersecurity incident in which information (or
part of an information system) is accessed without the right authorisation, typically with malicious intent, leading to the potential loss or misuse of that information.
(9) Insider Threat
An insider threat is an action that may result in an incident, performed by
someone or a group of people affiliated with or working for the potential victim.
(10) Botnets
A botnet is a network of connected devices infected by bot malware.
These devices are typically used by malicious actors to conduct Distributed Denial of Service (DDoS) attacks
(11) Physical Manipulation, Damage, Theft and Loss
Physical tampering, damage, theft and loss has drastically changed in the
past few years. The integrity of devices is vital for technology to become
mobile and for most implementations of the Internet of Things (IoT). IoT
can enhance physical security with more advanced and complex solutions. This way, IP security-based systems with smart sensors, Wi-Fi cameras, smart security lighting, drones and electronic locks can provide surveillance data that are evaluated by Artificial Intelligence (AI) and Machine Learning (ML) mechanisms to identify threats and respond with minimum delay and maximum accuracy. However, intelligent buildings,
mobile devices and smart wearables can be exploited to bypass physical security measures.
(12) Information Leakage
A data breach occurs when data, for which an organisation is
responsible, is subject to a security incident resulting in a breach of confidentiality, availability or integrity.
(13) Ransomware
Ransomware has become a popular weapon in the hands of malicious
actors who try to harm governments, businesses and individuals on a
daily basis. In such cases, the ransomware victim may suffer economic
losses either by paying the ransom demanded or by paying the cost of
recovering from the loss, if they do not comply with the attackerās demands.
(14) Cyber Espionage
Cyber espionage is considered both a threat and a motive in the
cybersecurity playbook. It is defined as āthe use of computer networks to
gain illicit access to confidential information, typically that held by a government or other organisationā.
(15) Cryptojacking
Cryptojacking (also known as cryptomining) is the unauthorized use of a
deviceās resources to mine cryptocurrencies. Targets include any
connected device, such as computers and mobile phones; however,
cybercriminals have been increasingly targeting cloud infrastructures.
iTM covers all aspects of cybersecurity from Home cyber security managed solutions to automated, manage threat intelligence, forensic investigations and cyber security training. Our objective is to support organisations and consumers at every step of their cyber maturity journey. Contact Us for more information.