Cyber security news for all

More

    Trend Micro has presented its IT security predictions for the coming year

    In 2020, companies will primarily suffer from weaknesses that have entered their network through third-party providers, container components or supply chain attacks. Just because you outsource the hardware, you have not outsourced responsibility.

    What Will Be The Biggest IT Threats In 2020?

    The Japanese IT security provider Trend Micro was also concerned with this question. In December, the company announced its security forecasts for the coming year. One point runs through the majority of predictions: inherited vulnerabilities and responsibilities. This refers to vulnerabilities that you did not create yourself, such as security holes in widespread container images. If companies use holes in container code for their own applications, they are also vulnerable. This is made worse by the fact that companies often pay too little attention to what they take over from third-party providers. Your focus is on the part that you contribute to the stack. But anyone who provides a service is also responsible if the vulnerability is not in their own code, but in a component from a third-party provider.

    Trend Micro Security Predictions

    Supply Chain Attacks Are Increasing

    Inherited vulnerabilities are not always accidental. Cybercriminals often deliberately target the suppliers of their actual victims – because they suspect security measures here. With such supply chain attacks, the attackers try to penetrate their victim’s network as unnoticed as possible. The effort is significantly greater than with a conventional, direct attack. But once the attacker does it, there is practically no defense left. Because the attack does not come via the perimeter, but from your own server and radiates from there to the entire network.

    Supply chain attacks are not new. However, they should increase strongly in the coming year. Why? Malware has been very successful in infecting companies this year. The hacker looked around the system manually and only then decided what to do. Trend Micro assumes that some service providers were infected in this way in 2019 and that the supply chain attacks are now being prepared. Because these attacks are very complex and take a lot of time.

    Trend Micro expects more cyberattacks on critical infrastructures in 2020. However, these are still test attacks because there is still no scalable business model. Cybercriminals want to capture as much money as possible with as little risk as possible. However, if a cybercriminal finds a scalable business model, we have a problem. Because the target area is constantly increasing: what is connected also has weak points that can be exploited.

    Recent Articles

    Millions of RDP attacks on home offices

    Since the corona related move to the home office, the number of daily hacker attacks on remote desktop connections has increased more than tenfold....

    KuCion crypto confirms 150 million dollar security breach

    Cyber criminals were able to steal from the KuCion crypto and stole coins worth millions. On the evening of last Friday, KuCion crypto noticed...

    Hungarian banks were the target of a massive DDoS attack

    Several banks and the Hungarian Telekom have been the target of a cyber attack. The attacks are said to have come in several waves...

    The source code of Windows XP is leaked

    The source code of Windows XP is currently freely accessible. The media says that data first appeared on 4chan and is currently being exchanged...

    Hackers send malicious Azure Cloud apps to Microsoft

    Microsoft has banned some Azure Cloud applications from its cloud that the company identified as part of an attack infrastructure. Microsoft describes the approach...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox