Wednesday, March 3, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Internet Security

Automaton takes center stage in enterprise cyberattacks

February 11, 2020
in Internet Security
Automaton takes center stage in enterprise cyberattacks
585
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

Malware: Hacking campaign linked to Iran
Researchers at Recorded Future have linked trojan malware intrusions and espionage to a state-backed hacking operation working out of Iran.

The use of automaton to weaponize stolen information dumps is an emerging trend in cyberattacks taking place against enterprise targets, new research suggests. 

You might also like

Malaysia Airlines suffers data security ‘incident’ spanning nine years

Remote work: 5 things every business needs to know

New app rollout helps reduce paperwork for NSW frontline child protection caseworkers

On Tuesday, IBM released the annual X-Force Threat Intelligence Index, a report based on information gathered from 70 billion security events across 130 countries to spot patterns and themes in cybersecurity. 

This year’s report says that roughly 60 percent of unauthorized entries into networks leverage either stolen data or known vulnerabilities that are yet to be patched. 

See also: As coronavirus challenges mount, WHO’s reputation is being hijacked for data theft scams

With data repositories to hand or exploits for pre-existing security flaws, this has led to a decline in phishing attacks, accounting for only 31 percent of successful infection attack vectors over 2019 — a drop of 25 percent year-on-year. 

IBM says that last year, over 8.5 billion records were compromised, a 200 percent increase in exposed data from 2018. Over 85 percent of these records were leaked due to misconfigurations in the cloud. 

In turn, this is giving threat actors more ammunition for automatic credential-stuffing attacks.

CNET: Everything you need to know about SIM swap fraud, plus one thing to do right now

A recent EMA study suggested that 39 percent of enterprise employees reuse the same credentials across multiple accounts and close to a third are not resetting them on a regular basis, leading to a situation which “favors cybercriminals’ ability to scale attacks,” IBM says. 

“The amount of exposed records that we’re seeing today means that cybercriminals are getting their hands on more keys to our homes and businesses,” said Wendi Whitmore, Vice President of IBM X-Force Threat Intelligence. “Attackers won’t need to invest time to devise sophisticated ways into a business; they can deploy their attacks simply by using known entities, such as logging in with stolen credentials.”  

TechRepublic: How Shadow IT could put your organization at risk

While stolen credentials are now an entry point into corporate networks 29 percent of the time, in a third of cases, cyberattackers will exploit vulnerabilities. Of particular note are old bugs that have existed for years, including those relating to Microsoft Office and the Windows Server Message Block, which remain unpatched and are still successfully being used as attack vectors. 

Of note are Industrial Control Systems (ICS), the report says, which are estimated to be experiencing a 2000 percent increase in attacks year-over-year. 

According to IBM, the major of cyberattacks against manufacturers involved known vulnerabilities in SCADA and ICS hardware, as well as credential stuffing tactics. The increase has been linked to the activities of two specific groups, Xenotime and APT33.

“The risk surface will continue to grow in 2020, with more than 150,000 current vulnerabilities and new ones reported regularly,” the report notes. “With over four times as many records breached in 2019 as in 2018, the year 2020 could see another big number of lost records due to breaches and attacks.”

Previous and related coverage


Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0


Credit: Zdnet

Previous Post

Arsenal’s Big Summer Blowout Must Include a Massive Lacazette Sale

Next Post

AI and the growing risk of "digital redlining" - Fortune

Related Posts

Malaysia Airlines suffers data security ‘incident’ spanning nine years
Internet Security

Malaysia Airlines suffers data security ‘incident’ spanning nine years

March 3, 2021
Remote work: 5 things every business needs to know
Internet Security

Remote work: 5 things every business needs to know

March 3, 2021
New app rollout helps reduce paperwork for NSW frontline child protection caseworkers
Internet Security

New app rollout helps reduce paperwork for NSW frontline child protection caseworkers

March 3, 2021
Linux Mint may start pushing high-priority patches to users
Internet Security

Linux Mint may start pushing high-priority patches to users

March 3, 2021
Ransomware puzzle: These two pieces of malware look very different, but they evolved from the same root
Internet Security

Ransomware puzzle: These two pieces of malware look very different, but they evolved from the same root

March 3, 2021
Next Post
AI and the growing risk of “digital redlining” – Fortune

AI and the growing risk of "digital redlining" - Fortune

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

6 Ways Machine Learning Can Improve Supply Chain’s Bottom Line
Machine Learning

6 Ways Machine Learning Can Improve Supply Chain’s Bottom Line

March 3, 2021
Malaysia Airlines suffers data security ‘incident’ spanning nine years
Internet Security

Malaysia Airlines suffers data security ‘incident’ spanning nine years

March 3, 2021
URGENT — 4 Actively Exploited 0-Day Flaws Found in Microsoft Exchange
Internet Privacy

URGENT — 4 Actively Exploited 0-Day Flaws Found in Microsoft Exchange

March 3, 2021
This Protein Therapeutics Company Integrates Wet Lab For High-Speed Characterization With Machine Learning Technologies To Guide The Search For Better Antibodies
Machine Learning

This Protein Therapeutics Company Integrates Wet Lab For High-Speed Characterization With Machine Learning Technologies To Guide The Search For Better Antibodies

March 3, 2021
Breadcrumbing Job Applicants: Bad for Employers
Marketing Technology

Breadcrumbing Job Applicants: Bad for Employers

March 3, 2021
Remote work: 5 things every business needs to know
Internet Security

Remote work: 5 things every business needs to know

March 3, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • 6 Ways Machine Learning Can Improve Supply Chain’s Bottom Line March 3, 2021
  • Malaysia Airlines suffers data security ‘incident’ spanning nine years March 3, 2021
  • URGENT — 4 Actively Exploited 0-Day Flaws Found in Microsoft Exchange March 3, 2021
  • This Protein Therapeutics Company Integrates Wet Lab For High-Speed Characterization With Machine Learning Technologies To Guide The Search For Better Antibodies March 3, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates