Top 15 Cyber Threats

The top 15 cyber threat reports are of a technical nature, and include findings, major incidents, statistics and more. The threat reports are the following:

(1) Malware

Malware is a common type of cyberattack in the form of malicious
software.

(2) Web-based Attacks

Web-based attacks are an attractive method by which threat actors can
delude victims using web systems and services as the threat vector.

(3) Phishing

Phishing is the fraudulent attempt to steal user data such as login
credentials, credit card information, or even money using social
engineering techniques.

(4) Web Application Attacks

Web applications and technologies have become a core part of the
internet by adopting different uses and functionalities. The increase in
the complexity of web application and their widespread services creates
challenges in securing them against threats with diverse motivations
from financial or reputational damage to the theft of critical or personal information

(5) SPAM

Spam consists of sending unsolicited messages in bulk. It is considered a cybersecurity
threat when used as an attack vector to distribute or enable other threats.

(6) Distributed Denial of Service (DDoS)

Distributed Denial of Service (DDoS) attacks are known to occur when
users of a system or service are not able to access the relevant information, services or other resources.

(7) Identity Theft

Identity theft or identify fraud is the illicit use of a victimā€™s personal
identifiable information (PII) by an impostor to impersonate that person and gain a financial advantage and other benefits.

(8) Data Breach

A data breach is a type of cybersecurity incident in which information (or
part of an information system) is accessed without the right authorisation, typically with malicious intent, leading to the potential loss or misuse of that information.

(9) Insider Threat

An insider threat is an action that may result in an incident, performed by
someone or a group of people affiliated with or working for the potential victim.

(10) Botnets

A botnet is a network of connected devices infected by bot malware.
These devices are typically used by malicious actors to conduct Distributed Denial of Service (DDoS) attacks

(11) Physical Manipulation, Damage, Theft and Loss

Physical tampering, damage, theft and loss has drastically changed in the
past few years. The integrity of devices is vital for technology to become
mobile and for most implementations of the Internet of Things (IoT). IoT
can enhance physical security with more advanced and complex solutions. This way, IP security-based systems with smart sensors, Wi-Fi cameras, smart security lighting, drones and electronic locks can provide surveillance data that are evaluated by Artificial Intelligence (AI) and Machine Learning (ML) mechanisms to identify threats and respond with minimum delay and maximum accuracy. However, intelligent buildings,
mobile devices and smart wearables can be exploited to bypass physical security measures.

(12) Information Leakage

A data breach occurs when data, for which an organisation is
responsible, is subject to a security incident resulting in a breach of confidentiality, availability or integrity.

(13) Ransomware

Ransomware has become a popular weapon in the hands of malicious
actors who try to harm governments, businesses and individuals on a
daily basis. In such cases, the ransomware victim may suffer economic
losses either by paying the ransom demanded or by paying the cost of
recovering from the loss, if they do not comply with the attackerā€™s demands.

(14) Cyber Espionage

Cyber espionage is considered both a threat and a motive in the
cybersecurity playbook. It is defined as ā€˜the use of computer networks to
gain illicit access to confidential information, typically that held by a government or other organisationā€™.

(15) Cryptojacking

Cryptojacking (also known as cryptomining) is the unauthorized use of a
deviceā€™s resources to mine cryptocurrencies. Targets include any
connected device, such as computers and mobile phones; however,
cybercriminals have been increasingly targeting cloud infrastructures.

Source:

iTM covers all aspects of cybersecurity from Home cyber security managed solutions to automated, manage threat intelligence, forensic investigations and cyber security training. Our objective is to support organisations and consumers at every step of their cyber maturity journey. Contact Us for more information.

Leave a Reply

Your email address will not be published. Required fields are marked *