Mouser Left Banner
Mouser Left Banner
Mouser Left Banner
Mouser Left Banner
Mouser Left Banner
Mouser Left Banner
More

    Cybersecurity Threats and Vulnerabilty trends in APAC for 2019

    2018 has been another transformative time for security teams in APAC regions. The imposition of new regulations like Australia’s Notifiable Data Breaches scheme and the Indian government’s push to be GDPR compliant due to recent global breaches, have been influential on cybersecurity investment and strategy.

    Along with a rise in the number of incidents of data theft and Cybersecurity Threats in India and a workforce bogged down compliance management, 2018 has been another challenging year for cybersecurity and business leaders. But does 2019 face the same fate? Sivan Nir, Senior Analyst, Skybox Research Lab, makes her predictions for the year ahead.

    • Crypto-jacking keeps going: 2018 saw unauthorised cryptomining replace ransomware as the most popular malware, and this will not abate. Monero has been identified as the cryptocurrency which is most associated with this activity. This type of malware can often go around undetected, and it’s a good way for hackers to stay active for the maximum amount of time and make quick money. Why would they turn to an alternative?
    • Mobile vulnerabilities keep rising: A continuing trend which emerged at the end of 2017 is the exponentially growing number of mobile vulnerabilities. This is only going to continue as mobile further blurs the line between personal and business device. Furthermore, third-party applications used on smart phones are a good way for malware to enter an organization, as well as open applications, particularly Android.
    • Cloud misconfigurations cause chaos: As more and more companies migrate to the cloud, the biggest risk will be seen in the misconfiguration of the cloud environment, showing that humans continue to be one of the weakest links in security. In addition, the incorporation of third-party software in the cloud means organisations won’t have full control over their attack surface. Cloud technology is still relatively new, with no set best practices, so it’s not as clear to IT people how to secure a cloud environment as opposed to on-prem networks. Next year, hackers will take more advantage of these weaknesses.
    • Ransomware won’t fade away: 2017 will always be remembered as the ‘year of ransomware’. While cryptomining is overshadowing ransomware, it’s important that CISOs don’t let their guard drop on this older threat. Although illicit cryptomining is easier to undertake, ransomware has the potential to reap bigger immediate awards when precisely targeted at an organisation that cannot afford to kiss their encrypted files goodbye. So, ransomware will continue to wreak havoc, using a variety of new techniques to enter the network.
    • AI arms race: AI will be increasingly used to identify and protect against attacks, but 2019 will see a surge in the number of vulnerabilities in AI and chatbots as threat actors realize the value in this activity. Hackers will begin to use AI to make more efficient and persistent malware attacks. At some level this may even culminate in an AI cyber-arms race. There will be more investment being ploughed into cyber-AI on both sides of the battlefield.
    ELE Times Research Desk
    ELE Times Research Deskhttps://www.eletimes.com
    ELE Times provides a comprehensive global coverage of Electronics, Technology and the Market. In addition to providing in depth articles, ELE Times attracts the industry’s largest, qualified and highly engaged audiences, who appreciate our timely, relevant content and popular formats. ELE Times helps you build awareness, drive traffic, communicate your offerings to right audience, generate leads and sell your products better.

    Technology Articles

    Popular Posts

    Latest News

    Must Read

    ELE Times Top 10