Story image

IoT, chip processors emerging as new cyber battlegrounds – report

05 Jun 2018

The number of types of ransomware variants in play increased by 101 percent in 2017, a report has found.

SonicWall’s Cyber Threat Report inferred that this may mark a pivot point for threat actors as they’ve exhausted the capabilities of standard ransomware and need a new approach.

The report gathered information from over a million security sensors in nearly 200 countries and territories.

Ransomware, in particular, has become part of the mainstream understanding of cybersecurity because of its ability to successfully and simultaneously target large organisations, small business, and individuals.

“The cyber arms race affects every government, business, organisation and individual. It cannot be won by any one of us,” says SonicWall CEO Bill Conner.

“Our latest proprietary data and findings show a series of strategic attacks and countermeasures as the cyber arms race continues to escalate.

“By sharing actionable intelligence, we collectively improve our business and security postures against today’s most malicious threats and criminals.”

To this end, Sonicwall has made the Cyber Threat Report widely available online.

The report contains critical insights that can help organisations leverage their strengths and resources to prepare better for threats.

  • Key advances in the security industry and cybercriminals
  • Exclusive data on the 2017 threat landscape
  • Security predictions for 2018
  • Cybersecurity guidelines and best practices
ESET researchers break down latest arsenal of the infamous Sednit group
At the end of August 2018, the Sednit group launched a spear-phishing email campaign, in which it distributed shortened URLs that delivered first-stage Zebrocy components.
Container survey shows adoption accelerating while security concerns remain top of mind
The report features insights from over 500 IT professionals.
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Fake apps on Google Play scamming users out of cryptocurrency
Fake cryptocurrency apps on Google Play have been discovered to be phishing and scamming users out of cryptocurrency, according to a new report from ESET.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
SEGA turns to Palo Alto Networks for cybersecurity protection
When one of the world’s largest video game pioneers wanted to strengthen its IT defences against cyber threats, it started with firewalls and real-time threat intelligence from Palo Alto Networks.
Forrester names Trend Micro Leader in email security
TrendMicro earned the highest score for technology leadership, deployment options and cloud integration.
LogRhythm releases cloud-based SIEM solution
LogRhythm Cloud provides the same feature set and user experience as its on-prem experience.