Connect with us

Hi, what are you looking for?

HEADLINES

Fortinet unveils predictions from FortiGuard Labs’ threat predictions for 2021

For the year 2021 and beyond, cybercriminals will leverage edge computing, 5G-enabled devices, and advances in computing performance and connectivity to create new and advanced threats at unprecedented speed and scale.

The ever-changing security landscape faces new threats every year as cyberattackers evolve their approach, using a range of techniques to get into businesses and organizations. When a technique they used fails, they move on to the next, until they find a weak spot. 

As the year 2020 draws to a close, cybersecurity solutions provider Fortinet unveiled predictions from the FortiGuard Labs’ threat predictions for 2021. These predictions reveal tactics that Fortinet expects cybercriminals will leverage in the near future as well as trends that can be expected to see in the coming years.  

For the year 2021 and beyond, cybercriminals will leverage edge computing, 5G-enabled devices, and advances in computing performance and connectivity to create new and advanced threats at unprecedented speed and scale.

Intelligent edge environments such as WAN, multi-cloud, data center, remote workers, IoT, and more, which replaced traditional networks will be the target of attackers. While these edges are interconnected, many organizations have sacrificed centralized visibility and unified control in favor of performance and digital transformation. Thus, this becomes an advantage for cyber criminals to target these environments using the speed and scale possibilities 5G will enable.

Advertisement. Scroll to continue reading.

Apart from this, cyber adversaries will continue to shift significant resources to target and exploit emerging network edge environments such as remote workers, the cloud or even OT edge environments, rather than just targeting the core network. Besides, advanced malware could also discover more valuable data and trends using new EATs (Edge Access Trojans) and perform invasive activities such as intercept requests off the local network to compromise additional systems or inject additional attack commands.

Deploying 5G-enabled devices opens up opportunities for more advanced threats such as swarm-based attacks. Leveraging hijacked devices divided into subgroups, these attacks target networks or devices as an integrated system and share intelligence in real time to refine attack as it is happening.

Smart devices will no longer be targets for attacks but will also be conduits for deeper attacks. Leveraging users’ important information such as daily routines and financial information could make social engineering-based attacks more successful. Smarter attacks can now enable the ransoming and extortion of additional data.

As ransomware continues to evolve, and IT systems increasingly converge with OT systems, particularly critical infrastructure, more data, devices and unfortunately lives will be at risk. Human lives will be at risk when field devices and sensors at the OT edge which include critical infrastructure, increasingly become targets of cyber criminals in the field.    

Innovations in computing performance and connectivity will also be targeted for adversaries’ gains. By attacking these innovations, cybercriminals would be able to process massive amounts of data, and learn how and when edge devices are used.

Advertisement. Scroll to continue reading.

Regarding quantum computing, this innovation could create a new risk when it eventually is capable of challenging the effectiveness of encryption in the future. With enormous compute power, quantum computers could render some asymmetric encryption algorithms solvable. As a result, organizations will need to prepare to shift to quantum-resistant crypto algorithms by using the principle of crypto agility to ensure the protection of current and future information.

Artificial Intelligence (AI)-driven technology will be critical to defend against future attacks. This technology needs to evolve to the next generation that can see, anticipate, and counter attacks as cyber attacks of the future will occur in microseconds. Threat actor playbooks or those tactics, techniques and procedures (TTPs) by threat criminals can be fed to AI systems to enable the detection of attack patterns.  

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

ELECTRONICS

Philips EasyKey partnered with Megaworld and equipped their world-class properties with only the best-in-class smart locks we have on offer, the Philips EasyKey 9300.

HEADLINES

Fortinet Secure SD-WAN transforms wide area networks (WANs) by enabling resilient architecture and flexible security deployments on-premises and in the cloud with digital experience monitoring...

HEADLINES

The PLDT wireless unit is also calling on customers to report these messages to Smart’s HULISCAM portal for further action.

HEADLINES

Here are some tips from Sophos for staying secure online during the cybersecurity awareness month.

HEADLINES

While only 21% of hackers believed that AI technologies enhance the value of hacking in 2023, 71% reported it to have value in 2024....

HEADLINES

Kaspersky has enhanced its Kaspersky Industrial CyberSecurity (KICS), a native XDR Platform for industrial enterprises, and streamlined Managed Detection and Response (MDR) for Industrial...

HEADLINES

Smart has received reports about unscrupulous individuals pretending to be company executives or representatives of organizations asking for donations for made-up or nonexistent relief...

HEADLINES

Located in the Kaspersky office, the new facility will provide the company’s stakeholders with services ranging from an overview of Kaspersky’s practices, to a...

Advertisement