Monday, March 8, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Internet Security

The hacking strategies that will dominate in 2019

February 16, 2019
in Internet Security
The hacking strategies that will dominate in 2019
586
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

If an organisation is connected to the internet and holds any type of data, it’s almost inevitable that it’s going to end up in the sights of hackers.

Pretty much any data from personal information and bank details to email addresses and passwords can be attractive to cyber attackers. They could take this information and sell it to others on the dark web, they could use it as a jumping-off point for larger campaigns — they could even dump it in public view, just to cause chaos.

You might also like

Maza Russian cybercriminal forum suffers data breach

Okta and Auth0: A $6.5 billion bet that identity will warrant its own cloud

CISA issues emergency directive to agencies: Deal with Microsoft Exchange zero-days now

The types of potential attacker are also broader than ever. Some large organisations will need to have the ability to fight off skilled cyber criminal gangs and nation-state backed hacking campaigns. But, for the most part, it’s likely that those attempting to breach an organisation won’t be the most advanced attackers in the world, especially now many cyber criminal marketplaces sell do-it-yourself kits. All of this is visible in the two very different hacking trends that will likely dominate this year. First, the mass adoption of sophisticated attacks by much less skilled attackers, and second, hyper-targeted attacks going after particular companies or even individuals.

Strategies and hacking techniques that may have once required specialist expertise are now sold in easy-to-use bundles, complete with tutorials for the non-tech savvy.

“There’s an entire as-a-service ecosystem and it’s really everywhere. It started as malware as-a-service, but now there’s also phishing as-a-service, exploit kits as-a-service, botnets as-a-service. Anyone can mix-and-match their own attacks, almost without knowing anything,” says Maya Horowtiz, director of threat intelligence and research at security company Check Point Software.

SEE: 17 tips for protecting Windows computers and Macs from ransomware (free PDF)

There are various examples of ransomware, malware and other malicious as-a-service campaigns that haven’t been conducted by criminal masterminds, but have still caused plenty of damage

“These tools are available on the open web, not even the dark web — you can really easily get your hands on them,” says Horowitz.

When it comes to the entry point for cyber attacks, phishing emails are still the most common means of forcing a way into the network.

Even simple phishing attacks can be surprisingly effective — lures like fake invoices or phoney requests from colleagues or customers are tried-and-tested techniques used by hackers to dupe victims into letting them in.

But with social media profiles and the wider internet providing attackers with vast and free resources to gather operational intelligence about victims, it’s entirely possible to scope out individual targets and tailor phishing attacks directly towards them.

Dubbed ‘rose phishing’, this could potentially supercharge phishing attacks by making it almost impossible for the victim to ignore the bait.

“With rose phishing, people are utilising social media to do that reconnaissance and really digging into it. The reconnaissance provides a much higher return on investment — you have a much higher probability of that person clicking on something of a personal nature about them,” says Amanda Fennell, chief security officer at Relativity.

SEE: A winning strategy for cybersecurity (ZDNet special report) | Download the report as a PDF (TechRepublic)

For example, if someone publicly posts that they’re on a business trip to a specific city, perhaps even staying at a specific hotel, attackers could take that information and use it to craft a highly specific lure.

“If you travel and post you’re at company headquarters in Chicago, next thing you know you could get a targeted email stating you left a document at O’Hare airport. You’d get really worried, it could be very compelling to click on,” Fennell explains.

“Or if you post about checking into a hotel in Chicago and then you get an invoice phishing attack [that] references that hotel. That’s enough for somebody who is savvy enough to use it to their advantage,” she adds.

As with any phishing attack, targeting the right person or people could give attackers the keys to the kingdom, allowing them to slowly but surely make their way across the network for whatever malicious goals they intend to carry out.

But it won’t end here: hackers are always looking for new and ingenious ways to conduct campaigns. While organisations may not be able to predict every type of attack vector hackers could use, they can develop a cybersecurity strategy that does the utmost to prevent attacks from being successful, no matter how they’re delivered.

READ MORE ON CYBER SECURITY

Credit: Source link

Previous Post

Lisk Machine Learning Reaches Market Capitalization of $11.77 Million (LML)

Next Post

Machine Learning Technology Radically Improves Accuracy of Additive Manufacturing

Related Posts

Maza Russian cybercriminal forum suffers data breach
Internet Security

Maza Russian cybercriminal forum suffers data breach

March 7, 2021
Okta and Auth0: A $6.5 billion bet that identity will warrant its own cloud
Internet Security

Okta and Auth0: A $6.5 billion bet that identity will warrant its own cloud

March 7, 2021
CISA issues emergency directive to agencies: Deal with Microsoft Exchange zero-days now
Internet Security

CISA issues emergency directive to agencies: Deal with Microsoft Exchange zero-days now

March 7, 2021
Linux distributions: All the talent and hard work that goes into building a good one
Internet Security

Linux distributions: All the talent and hard work that goes into building a good one

March 7, 2021
Check to see if you’re vulnerable to Microsoft Exchange Server zero-days using this tool
Internet Security

Check to see if you’re vulnerable to Microsoft Exchange Server zero-days using this tool

March 7, 2021
Next Post
Machine Learning Technology Radically Improves Accuracy of Additive Manufacturing

Machine Learning Technology Radically Improves Accuracy of Additive Manufacturing

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

How Machine Learning Is Changing Influencer Marketing
Machine Learning

How Machine Learning Is Changing Influencer Marketing

March 8, 2021
Video Highlights: Deep Learning for Probabilistic Time Series Forecasting
Machine Learning

Video Highlights: Deep Learning for Probabilistic Time Series Forecasting

March 7, 2021
Machine Learning Market Expansion Projected to Gain an Uptick During 2021-2027
Machine Learning

Machine Learning Market Expansion Projected to Gain an Uptick During 2021-2027

March 7, 2021
Maza Russian cybercriminal forum suffers data breach
Internet Security

Maza Russian cybercriminal forum suffers data breach

March 7, 2021
Clinical presentation of COVID-19 – a model derived by a machine learning algorithm
Machine Learning

Clinical presentation of COVID-19 – a model derived by a machine learning algorithm

March 7, 2021
Okta and Auth0: A $6.5 billion bet that identity will warrant its own cloud
Internet Security

Okta and Auth0: A $6.5 billion bet that identity will warrant its own cloud

March 7, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • How Machine Learning Is Changing Influencer Marketing March 8, 2021
  • Video Highlights: Deep Learning for Probabilistic Time Series Forecasting March 7, 2021
  • Machine Learning Market Expansion Projected to Gain an Uptick During 2021-2027 March 7, 2021
  • Maza Russian cybercriminal forum suffers data breach March 7, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates