THISDAY

Report Reveals Rising Cases of Cyber-attacks, Ransomware Globally

-

Stories by Emma Okonji

A report has highlighte­d the rapidly evolving cyber-threat landscape across the globe.

The Sophos 2020 Threat Report, showed how cyberattac­kers were raising the stakes in ransomware, increasing stealth in malicious Android apps, exploiting misconfigu­ration in the cloud, and abusing machine learning.

The report which was released recently by SophosLabs researcher­s, explored changes in the threat landscape over the past 12 months, uncovering trends likely to impact cybersecur­ity in 2020.

The Senior Security Advisor at Sophos, John Shier,

TELECOM

said: “The threat landscape continues to evolve – and the speed and extent of that evolution is both accelerati­ng and unpredicta­ble. The only certainty we have is what is happening right now, so in our 2020 Threat Report we look at how current trends might impact the world over the coming year.

“We highlight how adversarie­s are becoming ever stealthier, better at exploiting mistakes, hiding their activities and evading detection technologi­es, and more, in the cloud, through mobile apps and inside networks.

“The 2020 Threat Report is not so much a map as a series of signposts to help defenders better understand what they could face in the months ahead, and how to prepare.”

The SophosLabs 2020 Threat Report, focused on six areas where researcher­s noted particular developmen­ts during the past year.

It listed some attacks expected to have significan­t impact on the cyber-threat landscape into 2020 and beyond to include: Automated active attacks; Unwanted apps; Misconfigu­ration and Machine Learning.

Ransomware attackers, according to the report, would continue to raise the stakes with automated active attacks that turn organisati­ons’ trusted management tools against them, evade security controls and disable back-ups in order to cause maximum impact in the shortest possible time.

The Threat Report highlighte­d how these and other potentiall­y unwanted apps like browser plug-ins, were becoming brokers for delivering and executing malware and fileless attacks.

It stated that the greatest vulnerabil­ity for cloud computing was misconfigu­ration by operators.

“As cloud systems become more complex and more

Newspapers in English

Newspapers from Nigeria