Sunday Times (Sri Lanka)

Sophos’ annual Threat Report details top cyberattac­ks

-

Sophos, a global leader in cloud-enabled next-generation cybersecur­ity, this week launched its 2020 Threat Report providing insights into the rapidly evolving cyberthrea­t landscape. The report, produced by SophosLabs researcher­s, explores changes in the threat landscape over the past 12 months, uncovering trends likely to impact cybersecur­ity in 2020.

“The threat landscape continues to evolve – and the speed and extent of that evolution is both accelerati­ng and unpredicta­ble. The only certainty we have is what is happening right now, so in our 2020 Threat Report we look at how current trends might impact the world over the coming year. We highlight how adversarie­s are becoming ever stealthier, better at exploiting mistakes, hiding their activities and evading detection technologi­es, and more, in the cloud, through mobile apps and inside networks. The 2020 Threat Report is not so much a map as a series of signposts to help defenders better understand what they could face in the months ahead, and how to prepare,” said John Shier, senior security advisor, Sophos, said in a media release issued by Sophos.

The SophosLabs 2020 Threat Report, which is also summariaed in a SophosLabs Uncut article, focuses on six areas where researcher­s noted particular developmen­ts during this past year.

Among those expected to have significan­t impact on the cyberthrea­t landscape into 2020 and beyond are the following:

Ransomware attackers continue to raise the stakes with automated active attacks that turn organisati­ons’ trusted management tools against them, evade security controls and disable backups to cause maximum impact in the shortest possible time.

Unwanted apps are edging closer to malware. In a year that brought the subscripti­on-abusing Android Fleeceware apps, and ever more stealthy and aggressive adware, the Threat Report highlights how these and other potentiall­y unwanted apps (PUA), like browser plug-ins, are becoming brokers for delivering and executing malware and fileless attacks.

The greatest vulnerabil­ity for cloud computing is misconfigu­ration by operators. As cloud systems become more complex and more flexible, operator error is a growing risk. Combined with a general lack of visibility, this makes cloud computing environmen­ts a ready made target for cyberattac­kers.

Machine learning designed to defeat malware finds itself under attack. 2019 was the year when the potential of attacks against machine learning security systems was highlighte­d. Research showed how machine learning detection models could possibly be tricked, and how machine learning could be applied to offensive activity to generate highly convincing fake content for social engineerin­g. At the same time, defenders are applying machine learning to language as a way to detect malicious emails and URLs. This advanced game of cat and mouse is expected to become more prevalent in the future.

Other areas covered in the 2020 Threat Report include the danger of failing to spot cybercrimi­nal reconnaiss­ance hidden in the wider noise of Internet scanning, the continuing attack surface of the Remote Desktop Protocol (RDP), and the further advancemen­t of automated active attacks (AAA).

The greatest vulnerabil­ity for cloud computing is misconfigu­ration by operators. As cloud systems become more complex and more flexible, operator error is a growing risk

Newspapers in English

Newspapers from Sri Lanka