Cyber security news for all

More

    Cybercriminals Adopt Smarter Tactics with Less Effort

    Third-party data breaches have gained widespread attention due to the extensive supply chain involved in data collection and storage. The increasing trend of outsourcing data and technology solutions creates vulnerabilities several degrees away from the source, making systems susceptible to attacks.

    Digital transformation has expanded threat surfaces, with SaaS platforms and public cloud infrastructures extending the perimeter into the internet. This shift exposes users to greater risks.

    In pursuit of goals, hackers are embracing incremental strategies for impactful results. Rather than opting for high-profile ransomware attacks, cybercriminals manipulate small data elements to avoid detection, such as altering currency rates or transportation coordinates, demonstrating the potential for significant impact.

    Globally recognized sponsors of cyberattacks may face new competition from a South Asian country with a large population of engineers and programmers. Despite initially focusing on regional cyberattacks due to political tensions, this country may broaden its scope on the international stage.

    Rare earth materials like plutonium, terbium, and silicon wafers, crucial for modern hardware, are becoming highly sought-after resources. Disruptions in the strained supply chain could lead to widespread industry and economic consequences, providing an opportunity for threat actors seeking mass disruption or nations aiming to control markets.

    “Cybercriminals are continually working smarter, not harder,” emphasizes Michael Bruemmer, VP of Global Data Breach Resolution at Experian. Leveraging technologies like artificial intelligence, hackers strategically stay ahead, prompting organizations to remain vigilant against even minor security abnormalities.

    Similar to drug cartels, cybercriminal organizations are evolving into sophisticated entities, forming alliances globally. Countries may collaborate to advance common goals, leading to an increase in cyberwarfare alliances and hackers for trade.

    In 2024, threat actors may target publicly traded companies to gain insights for stock market manipulation or strategic planning. Instead of operating underground with stolen data, cybercriminals might leverage data extraction openly, posing as everyday investors.

    Jim Steven, Head of Crisis and Data Response Services at Experian Global Data Breach Resolution in the United Kingdom, emphasizes the need for companies to invest in sophisticated prevention and response methods to counter the diverse threats posed by global crime syndicates and nation-backed operations.

    Recent Articles

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox

    [tdn_block_newsletter_subscribe input_placeholder="Email address" btn_text="Subscribe" tds_newsletter2-image="730" tds_newsletter2-image_bg_color="#c3ecff" tds_newsletter3-input_bar_display="" tds_newsletter4-image="731" tds_newsletter4-image_bg_color="#fffbcf" tds_newsletter4-btn_bg_color="#f3b700" tds_newsletter4-check_accent="#f3b700" tds_newsletter5-tdicon="tdc-font-fa tdc-font-fa-envelope-o" tds_newsletter5-btn_bg_color="#000000" tds_newsletter5-btn_bg_color_hover="#4db2ec" tds_newsletter5-check_accent="#000000" tds_newsletter6-input_bar_display="row" tds_newsletter6-btn_bg_color="#da1414" tds_newsletter6-check_accent="#da1414" tds_newsletter7-image="732" tds_newsletter7-btn_bg_color="#1c69ad" tds_newsletter7-check_accent="#1c69ad" tds_newsletter7-f_title_font_size="20" tds_newsletter7-f_title_font_line_height="28px" tds_newsletter8-input_bar_display="row" tds_newsletter8-btn_bg_color="#00649e" tds_newsletter8-btn_bg_color_hover="#21709e" tds_newsletter8-check_accent="#00649e" embedded_form_code="YWN0aW9uJTNEJTIybGlzdC1tYW5hZ2UuY29tJTJGc3Vic2NyaWJlJTIy" tds_newsletter="tds_newsletter1" tds_newsletter3-all_border_width="2" tds_newsletter3-all_border_color="#e6e6e6" tdc_css="eyJhbGwiOnsibWFyZ2luLWJvdHRvbSI6IjAiLCJib3JkZXItY29sb3IiOiIjZTZlNmU2IiwiZGlzcGxheSI6IiJ9fQ==" tds_newsletter1-btn_bg_color="#0d42a2" tds_newsletter1-f_btn_font_family="406" tds_newsletter1-f_btn_font_transform="uppercase" tds_newsletter1-f_btn_font_weight="800" tds_newsletter1-f_btn_font_spacing="1" tds_newsletter1-f_input_font_line_height="eyJhbGwiOiIzIiwicG9ydHJhaXQiOiIyLjYiLCJsYW5kc2NhcGUiOiIyLjgifQ==" tds_newsletter1-f_input_font_family="406" tds_newsletter1-f_input_font_size="eyJhbGwiOiIxMyIsImxhbmRzY2FwZSI6IjEyIiwicG9ydHJhaXQiOiIxMSIsInBob25lIjoiMTMifQ==" tds_newsletter1-input_bg_color="#fcfcfc" tds_newsletter1-input_border_size="0" tds_newsletter1-f_btn_font_size="eyJsYW5kc2NhcGUiOiIxMiIsInBvcnRyYWl0IjoiMTEiLCJhbGwiOiIxMyJ9" content_align_horizontal="content-horiz-center"]