Top 5 Cybersecurity Threats to Watch in 2020

Table of Contents

My Post (2).pngThese days, cybercriminals are ambitious and innovative, with no shortage of tools and resources at their disposal to go after high-stakes targets and execute malicious code — all while flying completely under the radar.

To prepare you for what’s ahead, below are five of the top cybersecurity threats you might encounter in 2020.

Misconfigured Cloud Environments Set the Stage for Damaging Attacks

Cloud misconfigurations have been responsible for some of the most egregious breaches in recent memory. Last year, a Seattle-based hacker exploited a misconfigured web application firewall to access files of a major financial institution hosted on AWS S3 servers, resulting in a data breach that compromised the personal information of 100 million credit card customers. Unlike other threats, this security problem originates internally — often as a simple mistake that’s made during the deployment of cloud resources. This also paves the way for insider threats on cloud deployments. Yet even accidental oversights can result in costly and destructive breaches that will only become more pervasive as hackers increasingly turn their attention to the cloud.

Phishers Cast a Wider Net

As one of the cheapest and most efficient methods of reaching targets at scale, it’s not surprising that phishing is one of the leading causes of data breaches, according to the Verizon 2019 DBIR. However, hackers are upping their game with a myriad of advanced techniques. Phishers are targeting numerous business SaaS applications —  now accounting for 36% of all attacks — and are continuing to use personal information shared on numerous social media sites to create more authentic-looking, interpersonal messages. As a result, these attacks are becoming increasingly difficult to identify — even for the most tech-savvy users.

Malware Authors Up Their Game

Malware grew by leaps and bounds in 2019, and shows no signs of slowing down in 2020. According to AV-TEST, cyberattackers pushed the total number of known malware samples over the one billion mark — with attacks that are more sophisticated than ever before. Fileless malware attacks – malicious code that executes by piggybacking on legitimate software – are continuing an upward trajectory, along with new forms of “stalkerware” — spyware that tracks victim smartphone data to generate a big-picture view of their activities. On the ransomware landscape, new families are targeting high-value business data while others such as Maze are punishing victims who fail to pay up.  Read More

Learn More About SPLUNK

Table of Contents