sb-as logo
Story image

IoT, chip processors emerging as new cyber battlegrounds – report

05 Jun 2018

The number of types of ransomware variants in play increased by 101 percent in 2017, a report has found.

SonicWall’s Cyber Threat Report inferred that this may mark a pivot point for threat actors as they’ve exhausted the capabilities of standard ransomware and need a new approach.

The report gathered information from over a million security sensors in nearly 200 countries and territories.

Ransomware, in particular, has become part of the mainstream understanding of cybersecurity because of its ability to successfully and simultaneously target large organisations, small business, and individuals.

“The cyber arms race affects every government, business, organisation and individual. It cannot be won by any one of us,” says SonicWall CEO Bill Conner.

“Our latest proprietary data and findings show a series of strategic attacks and countermeasures as the cyber arms race continues to escalate.

“By sharing actionable intelligence, we collectively improve our business and security postures against today’s most malicious threats and criminals.”

To this end, Sonicwall has made the Cyber Threat Report widely available online.

The report contains critical insights that can help organisations leverage their strengths and resources to prepare better for threats.

  • Key advances in the security industry and cybercriminals
  • Exclusive data on the 2017 threat landscape
  • Security predictions for 2018
  • Cybersecurity guidelines and best practices
Story image
Cybersecurity budgets still not keeping up with threats — report
Executive teams are failing to recognise the level of damage cyber-threats pose to organisations, according to Sophos — many of them taking a ‘conservative approach’ to cybersecurity expenditure.More
Story image
Exploits on organisations doubling every two to three hours after news of Microsoft Exchange’s four zero-day vulnerabilities
The race has started between hackers and security professionals following the disclosure of vulnerabilities on Microsoft Exchange Servers, according to Check Point Research.More
Story image
Hybrid IAM solutions are the way of the future, study states
“As this first-of-its-kind research shows, while IT leaders are faced with unique criteria and conditions that shape their IT strategy, hybrid IAM has emerged as a necessity."More
Story image
Microsoft Exchange breach a wake-up call to ditch the server
"There are owners who still have in-house exchange servers because they are suspicious of the cloud or have concerns about their data sovereignty or don't want to contemplate the capital expenditure. But the warning is clear. Get rid of them."More
Story image
ABB and Nozomi Networks extend collaboration, deliver improved OT security solutions
"With Nozomi Networks solutions added to our cybersecurity portfolio, our customers gain proven network monitoring and threat detection technology."More
Story image
Attivo Networks expands Active Directory suite for greater protection
"We see Active Directory exploitation used in the majority of ransomware, insider and advanced attacks. We are pleased to now offer our customers early and efficient solutions for preventing the misuse of Active Directory.”More