cyber criminals

August 1, 2017

Report: The top 5 cybersecurity threats of 2017

As large-scale cybersecurity attacks continue to proliferate in the enterprise, attackers are broadening their approach […]
November 15, 2016

Ransomware Roundup: Survey shows few can escape cyberattacks

An international survey of 540 IT decision makers revealed that nearly 80% of them worked […]
November 11, 2016

Ten Cyber Security Predictions for 2017

Authored by BeyondTrust Security Experts: Brad Hibbert, CTO | Morey Haber, VP Technology | Scott Carlson, Technology […]
October 26, 2016

What We Know About Friday’s Cyber Attack That Broke The Internet

On Friday, many popular websites and mobile apps experienced repeated outages, the result of a […]
October 19, 2016

Social Media: A hunting ground for cybercriminals

Do you ever hesitate to click on a post shared by a friend on Facebook? […]

Report: The top 5 cybersecurity threats of 2017

As large-scale cybersecurity attacks continue to proliferate in the enterprise, attackers are broadening their approach in order to strengthen their impact. A Tuesday report from Accenture Security outlined new methods that hackers are using to gain access, steal data, and make money.

According to a press release announcing the report, the results were collected from intelligence gathered from iDefense, a part of Accenture Security. In addition to the growth of the sheer number of attacks, they are also becoming more destructive and being utilized by other entities, such as nation-states, the release said.

“The first six months of 2017 have seen an evolution of ransomware producing more viral variants unleashed by potential state-sponsored actors and cybercriminals. Our findings confirm that a new bar has been set for cybersecurity teams across all industries to defend their assets in the coming months,” Josh Ray, managing director at Accenture Security, said in the release.

According to the report, here are the five most notable threats facing the enterprise in 2017:

  1. Reverse Deception Tactics – Tools like anti-analysis code, steganography, and command-and-control servers are being used to hide stolen data, the release said.
  2. Sophisticated Phishing Campaigns – Phishing emails, often used to deliver malware, are becoming more sophisticated with the addition of specific company information regarding billing, logistics, and more.
  3. Strategic Use of Information Operations – Cyberattacks and cyberespionage are growing tools used by nation-states and other actors to achieve political disruption.
  4. Alternative Crypto-Currencies – Bitcoin’s popularity is forcing cybercriminals to improve their laundering techniques, or adopt different cryptocurrencies altogether.
  5. DDoS-for-Hire Services – Easy-to-use and affordable tools have made it easier than ever for attackers to offer Distributed denial of service (DDoS)-for-hire services.

“While the occurrence of new cyber attack methods is not going away, there are immediate actions companies can take to better protect themselves against malicious ransomware and reduce the impact of security breaches,” Ray said in the release.

In order order to improve their stance against these threats, the Accenture report recommended that businesses take the following steps:

Source: http://www.techrepublic.com/article/report-the-top-5-cybersecurity-threats-of-2017/