Connect with us

Hi, what are you looking for?

HEADLINES

Fortinet unveils predictions from FortiGuard Labs’ threat predictions for 2021

For the year 2021 and beyond, cybercriminals will leverage edge computing, 5G-enabled devices, and advances in computing performance and connectivity to create new and advanced threats at unprecedented speed and scale.

The ever-changing security landscape faces new threats every year as cyberattackers evolve their approach, using a range of techniques to get into businesses and organizations. When a technique they used fails, they move on to the next, until they find a weak spot. 

As the year 2020 draws to a close, cybersecurity solutions provider Fortinet unveiled predictions from the FortiGuard Labs’ threat predictions for 2021. These predictions reveal tactics that Fortinet expects cybercriminals will leverage in the near future as well as trends that can be expected to see in the coming years.  

For the year 2021 and beyond, cybercriminals will leverage edge computing, 5G-enabled devices, and advances in computing performance and connectivity to create new and advanced threats at unprecedented speed and scale.

Intelligent edge environments such as WAN, multi-cloud, data center, remote workers, IoT, and more, which replaced traditional networks will be the target of attackers. While these edges are interconnected, many organizations have sacrificed centralized visibility and unified control in favor of performance and digital transformation. Thus, this becomes an advantage for cyber criminals to target these environments using the speed and scale possibilities 5G will enable.

Advertisement. Scroll to continue reading.

Apart from this, cyber adversaries will continue to shift significant resources to target and exploit emerging network edge environments such as remote workers, the cloud or even OT edge environments, rather than just targeting the core network. Besides, advanced malware could also discover more valuable data and trends using new EATs (Edge Access Trojans) and perform invasive activities such as intercept requests off the local network to compromise additional systems or inject additional attack commands.

Deploying 5G-enabled devices opens up opportunities for more advanced threats such as swarm-based attacks. Leveraging hijacked devices divided into subgroups, these attacks target networks or devices as an integrated system and share intelligence in real time to refine attack as it is happening.

Smart devices will no longer be targets for attacks but will also be conduits for deeper attacks. Leveraging users’ important information such as daily routines and financial information could make social engineering-based attacks more successful. Smarter attacks can now enable the ransoming and extortion of additional data.

As ransomware continues to evolve, and IT systems increasingly converge with OT systems, particularly critical infrastructure, more data, devices and unfortunately lives will be at risk. Human lives will be at risk when field devices and sensors at the OT edge which include critical infrastructure, increasingly become targets of cyber criminals in the field.    

Innovations in computing performance and connectivity will also be targeted for adversaries’ gains. By attacking these innovations, cybercriminals would be able to process massive amounts of data, and learn how and when edge devices are used.

Advertisement. Scroll to continue reading.

Regarding quantum computing, this innovation could create a new risk when it eventually is capable of challenging the effectiveness of encryption in the future. With enormous compute power, quantum computers could render some asymmetric encryption algorithms solvable. As a result, organizations will need to prepare to shift to quantum-resistant crypto algorithms by using the principle of crypto agility to ensure the protection of current and future information.

Artificial Intelligence (AI)-driven technology will be critical to defend against future attacks. This technology needs to evolve to the next generation that can see, anticipate, and counter attacks as cyber attacks of the future will occur in microseconds. Threat actor playbooks or those tactics, techniques and procedures (TTPs) by threat criminals can be fed to AI systems to enable the detection of attack patterns.  

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

White Papers

When compared to 2023, Sophos saw a 51% increase in abusing “Living off the Land” binaries or LOLbins; since 2021, it’s increased by 83%.

HEADLINES

Someone illegally acquires or uses personal information such as bank account or credit card numbers of another person to obtain money, goods or services....

HEADLINES

The partnership enables MCU to integrate Fortinet’s Network Security Expert (NSE) training and certification program into its academic offerings, either as part of the curriculum or...

HEADLINES

To stay ahead of these challenges, organizations need to invest in AI-driven defenses, transition to quantum-safe encryption, and adopt a Zero Trust approach to...

HEADLINES

There was a 121% Year-on-Year (YoY) increase in identity fraud in 2024 across the region, with significant surges recorded in Singapore (207%), Thailand (206%)...

HEADLINES

As part of RCBC’s 2024 Cybersecurity literacy program, the webinar aims to help Filipinos level up their online banking safety by providing them with...

White Papers

The survey found that CXO’s feel less prepared than their global peers. Less than half or 48% in APAC said they felt completely prepared...

HEADLINES

On average, a single organization in the Philippines experiences 4,003 attacks per week, significantly higher than the APAC average of 2,870 attacks per week.

Advertisement