How Telcos Can Arm Themselves to be Competetive
are available only for registered users
To Read the full story
Deep Instinct, the first company to apply end-to-end deep learning to cybersecurity, released its 2022 Bi-Annual Cyber Threat Report earlier this month.
The newest edition of the report focuses on the top malware and ransomware trends and tactics from the first half of 2022 and provides key takeaways and predictions for the ever-evolving cybersecurity threat landscape.
“2022 has been another record year for cyber criminals and ransomware gangs. It’s no secret that these threat actors are constantly upping their game with new and improved tactics designed to evade traditional cyber defences,” said Mark Vaitzman, Threat Lab Team Leader at Deep Instinct.
“The goal of this report is to outline the wide range of challenges that organizations and their security teams face daily. Defenders...
Changes in threat actor structure
Some of the most prevalent activities observed include changes within the world of ransomware gangs, including LockBit, Hive, BlackCat, and Conti. The latter has spawned “Conti Splinters” made up of Quantum, BlackBasta, and BlackByte. These three prominent former affiliate groups to the Conti operation emerged under their own operations following the decline of Conti.
Malware campaigns in flux
The report highlights the reasons behind significant changes to Emotet, Agent Tesla, NanoCore, and others. For example, Emotet uses highly obfuscated VBA macros to avoid detection.
As Microsoft shuts down one avenue, bad actors open others
Deep Instinct’s researchers found that the use of documents for malware has decreased as the prior number one attack vector, following Microsoft’s move to disable macros by default in Microsoft Office files. Threat actors have already been seen shifting gears and implementing other methods to deploy their malware, such as LNK, HTML, and archive email attachments.
To Read the full story
Keyfactor: Why You Need to Care About Machine Identity
Intermedia: Cloud Migration is the Key to Enterprise Communications
Radware: Bot Mitigation is Key for Application Protection
Informatica: How Shifts in the Cloud are Changing the Game
Sifflet: Observability and the Future of Data Engineering
Safe Software: Low-Code/No-Code in Data Engineering
Egnyte: Keeping Up With The Next Generation of Data Privacy
Genestack: Why Data Management is the Key to Success in Life Sciences
Informatica: 4 Powerful Reasons Why Your Organization Benefits with Data Sharing
ManageEngine: Thinking Beyond ITSM and Achieving Enterprise Automation