| | MARCH 20218Since coronavirus attacked humans more than a year ago, the world was hit by another pandemic called cyberattacks. Though cyberattacks aren't new, but the frequency, pace and degree of attack has increased manifold. Especially when employees are working from home, it has become a little easy for the hackers/attackers to hold the companies for ransom. Hackers have indeed earned millions in ransomware.As we have already entered 2021, there are new and improved versions of threat that we have to deal with, and not just cyberthreats. As Raj Samani, Chief Scientist and McAfee Fellow, Advanced Threat Research says, "The year 2020 brought a historic pandemic and bad actors leveraging COVID-19 themed threats to test our security operations and our unprecedented shift to a remote work life. As we enter 2021, these concerns are still at the forefront, but we are also looking ahead to other cyber threats likely to confront us in the months and years ahead".He predicts that attacks on cloud platforms and users will evolve into a highly polarized state where they are either mechanized and widespread or sophisticated and precisely handcrafted. Let's look at some such threats that McAfee highlights.·Supply Chain Backdoor Techniques to ProliferateThe SolarWinds-SUNBURST espionage campaign came as a shock to many. The first major supply chain attack of its kind, this campaign is referred to by many as the `Cyber Pearl Harbor', and US cybersecurity experts have been predicting this for a decade and a half.What is more frightening is that fact that it will spark a proliferation in copycat supply chain attacks of this kind.If you think what makes the experts worry so much about this attack is the fact that it uses trusted software to bypass cyber defenses, infiltrate victim organizations with the backdoor and allow the attackers to take any number of secondary steps. This could involve stealing data, destroying data, holding critical systems for ransom, orchestrating system malfunctions that result in kinetic damage, or simply implanting additional malicious content throughout the organization to stay in control even after the initial threat appears to have passed.·Hacking the Home to Hack the OfficeConnected devices have been a reality since quite some 2021 & The ThreatsBY CEO INSIGHTS TEAMIN FOCUS
<
Page 7 |
Page 9 >