{"id":306,"date":"2020-10-21T07:33:16","date_gmt":"2020-10-21T06:33:16","guid":{"rendered":"https:\/\/www.itminister.co.uk\/blog\/?p=306"},"modified":"2020-10-21T07:36:28","modified_gmt":"2020-10-21T06:36:28","slug":"top-15-cyber-threats","status":"publish","type":"post","link":"https:\/\/www.itminister.co.uk\/blog\/top-15-cyber-threats\/","title":{"rendered":"Top 15 Cyber Threats"},"content":{"rendered":"\n<p>The top 15 cyber threat reports are of a technical nature, and include findings, major incidents, statistics and more. The threat reports are the following:<\/p>\n\n\n\n<p>(1) <strong>Malware<\/strong> <\/p>\n\n\n\n<p>Malware is a common type of cyberattack in the form of malicious<br>software.<\/p>\n\n\n\n<p>(2) <strong>Web-based Attacks<\/strong> <\/p>\n\n\n\n<p>Web-based attacks are an attractive method by which threat actors can<br>delude victims using web systems and services as the threat vector.<\/p>\n\n\n\n<p>(3) <strong>Phishing<\/strong> <\/p>\n\n\n\n<p>Phishing is the fraudulent attempt to steal user data such as login<br>credentials, credit card information, or even money using social<br>engineering techniques.<\/p>\n\n\n\n<p>(4) <strong>Web Application Attacks<\/strong><\/p>\n\n\n\n<p>Web applications and technologies have become a core part of the<br>internet by adopting different uses and functionalities. The increase in<br>the complexity of web application and their widespread services creates<br>challenges in securing them against threats with diverse motivations<br>from financial or reputational damage to the theft of critical or personal information<\/p>\n\n\n\n<p>(5) <strong>SPAM<\/strong><\/p>\n\n\n\n<p>Spam consists of sending unsolicited messages in bulk. It is considered a cybersecurity<br>threat when used as an attack vector to distribute or enable other threats.<\/p>\n\n\n\n<p>(6) <strong>Distributed Denial of Service (DDoS)<\/strong><\/p>\n\n\n\n<p>Distributed Denial of Service (DDoS) attacks are known to occur when<br>users of a system or service are not able to access the relevant information, services or other resources.<\/p>\n\n\n\n<p>(7) <strong>Identity Theft<\/strong><\/p>\n\n\n\n<p>Identity theft or identify fraud is the illicit use of a victim\u2019s personal<br>identifiable information (PII) by an impostor to impersonate that person and gain a financial advantage and other benefits.<\/p>\n\n\n\n<p>(8) <strong>Data Breach<\/strong><\/p>\n\n\n\n<p>A data breach is a type of cybersecurity incident in which information (or<br>part of an information system) is accessed without the right authorisation, typically with malicious intent, leading to the potential loss or misuse of that information.<\/p>\n\n\n\n<p>(9) <strong>Insider Threat<\/strong><\/p>\n\n\n\n<p>An insider threat is an action that may result in an incident, performed by<br>someone or a group of people affiliated with or working for the potential victim.<\/p>\n\n\n\n<p>(10) <strong>Botnets<\/strong><\/p>\n\n\n\n<p>A botnet is a network of connected devices infected by bot malware.<br>These devices are typically used by malicious actors to conduct Distributed Denial of Service (DDoS) attacks<\/p>\n\n\n\n<p>(11) <strong>Physical Manipulation, Damage, Theft and Loss<\/strong><\/p>\n\n\n\n<p>Physical tampering, damage, theft and loss has drastically changed in the<br>past few years. The integrity of devices is vital for technology to become<br>mobile and for most implementations of the Internet of Things (IoT). IoT<br>can enhance physical security with more advanced and complex solutions. This way, IP security-based systems with smart sensors, Wi-Fi cameras, smart security lighting, drones and electronic locks can provide surveillance data that are evaluated by Artificial Intelligence (AI) and Machine Learning (ML) mechanisms to identify threats and respond with minimum delay and maximum accuracy. However, intelligent buildings,<br>mobile devices and smart wearables can be exploited to bypass physical security measures.<\/p>\n\n\n\n<p>(12) <strong>Information Leakage<\/strong><\/p>\n\n\n\n<p>A data breach occurs when data, for which an organisation is<br>responsible, is subject to a security incident resulting in a breach of confidentiality, availability or integrity.<\/p>\n\n\n\n<p>(13) <strong>Ransomware<\/strong><\/p>\n\n\n\n<p>Ransomware has become a popular weapon in the hands of malicious<br>actors who try to harm governments, businesses and individuals on a<br>daily basis. In such cases, the ransomware victim may suffer economic<br>losses either by paying the ransom demanded or by paying the cost of<br>recovering from the loss, if they do not comply with the attacker\u2019s demands.<\/p>\n\n\n\n<p>(14) <strong>Cyber Espionage<\/strong><\/p>\n\n\n\n<p>Cyber espionage is considered both a threat and a motive in the<br>cybersecurity playbook. It is defined as \u2018the use of computer networks to<br>gain illicit access to confidential information, typically that held by a government or other organisation\u2019.<\/p>\n\n\n\n<p>(15) <strong>Cryptojacking<\/strong><\/p>\n\n\n\n<p>Cryptojacking (also known as cryptomining) is the unauthorized use of a<br>device\u2019s resources to mine cryptocurrencies. Targets include any<br>connected device, such as computers and mobile phones; however,<br>cybercriminals have been increasingly targeting cloud infrastructures.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2020-list-of-top-15-threats\">Source<\/a>: <\/p>\n\n\n\n<p>iTM covers all aspects of cybersecurity from Home cyber security managed solutions to automated, manage threat intelligence, forensic investigations and cyber security training. Our objective is to support organisations and consumers at every step of their cyber maturity journey.<a href=\"https:\/\/www.itminister.co.uk\/contact.html\"> Contact Us<\/a> for more information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The top 15 cyber threat reports are of a technical nature, and include findings, major incidents, statistics and more. The threat reports are the following: (1) Malware Malware is a common type of cyberattack in the form of malicioussoftware. (2) Web-based Attacks Web-based attacks are an attractive method by which threat actors candelude victims using &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.itminister.co.uk\/blog\/top-15-cyber-threats\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Top 15 Cyber Threats&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","beyondwords_generate_audio":"","beyondwords_integration_method":"","beyondwords_project_id":"","beyondwords_content_id":"","beyondwords_preview_token":"","beyondwords_player_content":"","beyondwords_player_style":"","beyondwords_language_code":"","beyondwords_language_id":"","beyondwords_title_voice_id":"","beyondwords_body_voice_id":"","beyondwords_summary_voice_id":"","beyondwords_error_message":"","beyondwords_disabled":"","beyondwords_delete_content":"","beyondwords_podcast_id":"","beyondwords_hash":"","publish_post_to_speechkit":"","speechkit_hash":"","speechkit_generate_audio":"","speechkit_project_id":"","speechkit_podcast_id":"","speechkit_error_message":"","speechkit_disabled":"","speechkit_access_key":"","speechkit_error":"","speechkit_info":"","speechkit_response":"","speechkit_retries":"","speechkit_status":"","speechkit_updated_at":"","_speechkit_link":"","_speechkit_text":""},"categories":[16,17,18,23,8,19,14,2,24,7,10,20,9],"tags":[],"class_list":["post-306","post","type-post","status-publish","format-standard","hentry","category-cyber-crime","category-cyber-risk","category-cyber-security-best-practice","category-cyber-security-research","category-encryption","category-home-cyber-security","category-insider-threats","category-iot","category-mobile-device-security","category-privacy","category-ransomware","category-security-testing","category-training"],"_links":{"self":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/306","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=306"}],"version-history":[{"count":3,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/306\/revisions"}],"predecessor-version":[{"id":309,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/306\/revisions\/309"}],"wp:attachment":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=306"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=306"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=306"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}