Thursday, March 30, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > 7 top cyber attack predictions for 2020

7 top cyber attack predictions for 2020

The cyber attackers are raising the stakes in ransomware, increasing stealth in malicious Android apps, exploiting misconfigurations in the cloud and abusing machine learning.


Seda Nur Cinar Seda Nur Cinar
November 6, 2019
3 min read
7 top cyber attack predictions for 2020

Cloud-enabled next-generation cybersecurity company Sophos released its 2020 Threat Report providing insights into the rapidly evolving cyberthreat landscape. The report, produced by SophosLabs researchers, explores changes in the threat landscape over the past 12 months, uncovering trends likely to impact cybersecurity in 2020.

Table of Contents

  • Evolution of ransomware
  • 7 types of cyber attacks
    • Ransomware attacks are at the top
    • Unwanted apps are edging closer to malware
    • Misconfiguration leaves the door open
    • Machine learning is under attack
    • RDP vulnerabilities are still favorite
    • Mobile adware are stealing personal data
    • Cloud can be a security problem

Evolution of ransomware

The researchers also analyzed ransomware evolution from 1989 to 2019. The first ransomware-targeted IT service providers In 2019 were GandCab, REvil, while in 2018 large-scale attacks were deployed on providers such as SamSam, Ryuk, Dharma.

Sophos Thread Report

7 types of cyber attacks

The SophosLabs 2020 Threat Report focuses on several areas where researchers noted particular developments during this past year.

John Shier, senior security advisor, Sopho said:

The threat landscape continues to evolve – and the speed and extent of that evolution is both accelerating and unpredictable. The only certainty we have is what is happening right now, so in our 2020 Threat Report we look at how current trends might impact the world over the coming year. We highlight how adversaries are becoming ever stealthier, better at exploiting mistakes, hiding their activities and evading detection technologies, and more, in the cloud, through mobile apps and inside networks. The 2020 Threat Report is not so much a map as a series of signposts to help defenders better understand what they could face in the months ahead, and how to prepare.

Ransomware attacks are at the top

Ransomware attackers continue to raise the stakes with automated active attacks that turn organizations’ trusted management tools against them, evade security controls, and disable backups in order to cause a maximum impact in the shortest possible time.

Unwanted apps are edging closer to malware

In a year that brought the subscription-abusing Android Fleeceware apps, and ever more stealthy and aggressive adware, the Threat Report highlights how these and other potentially unwanted apps (PUA), like browser plug-ins, are becoming vectors for delivering and executing malware and fileless attacks.

Misconfiguration leaves the door open

The greatest vulnerability of cloud computing is misconfiguration by operators. As cloud systems become more complex and more flexible, operator error is a growing risk. Combined with a general lack of visibility, this makes cloud computing environments a ready-made target for cyberattackers.

Machine learning is under attack

2019 was the year when the potential of attacks against machine learning security systems were highlighted. Research showed how machine learning detection models could possibly be tricked, and how machine learning could be applied to offensive activity to generate highly convincing fake content for social engineering. At the same time, defenders are applying machine learning to language as a way to detect malicious emails and URLs. This advanced game of cat and mouse is expected to become more prevalent in the future.

RDP vulnerabilities are still favorite

The danger of failing to spot cybercriminal reconnaissance hidden in the wider noise of internet scanning, the continuing attack surface of the Remote Desktop Protocol (RDP), and the further advancement of automated active attacks (AAA) are also covered in the 2020 Threat Report.

Mobile adware are stealing personal data

Although mobile advertising is a common income channel for developers and companies, the researchers discovered a number of Android applications contain malicious code. That way the application can begin stealing the personal data of the user. After that, the data can be sold in the black market. Some developers enforce the users to click advertising content in order to convince advertisers that the app users are interested in the advertisement itself.

Cloud can be a security problem

Cloud computing is very flexible. For that reason, with very little effort, it is possible to increase or decrease the resources as needed. This is very useful for businesses to scale up computing demand. But cloud computing can be a very big security problem if the required countermeasures are not taken. Misconfiguration may lead to vulnerabilities that may result in an entire customer database disclosure.

For further information, you can read and download the Sophos 2020 Thread Report 

See more Cybersecurity News

A comprehensive guide to understanding Cybersecurity: What is Cybersecurity?


Tags: AdwareCyber AttackMalwareRansomwareSophos
Seda Nur Cinar

Seda Nur Cinar

Seda Nur Cinar is the news editor of the Cloud7 News. With more than 8 years of Linux and cloud experience, Seda is a Linux and opensource enthusiast, security researcher and a web application developer.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
IBM Cloud for VMware Solutions will be available in December

IBM Cloud for VMware Solutions will be available in December

Related News

What is Continuous Testing in DevOps_

What is continuous testing in DevOps?

March 29, 2023 8:00 pm
What is Browser Automation Get Started Guide

What is browser automation: Getting started guide

March 29, 2023 4:00 pm
7 best live chat plugins for WordPress

7 best live chat plugins for WordPress

March 29, 2023 3:00 pm
All you need to know about mobile automation testing

All you need to know about mobile automation testing

March 29, 2023 2:00 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Recent News

  • [Event] Grab your DeveloperWeek Europe 2023 ticket free
  • How to get Linux ready for gaming
  • Trisquel GNU/Linux 11.0 review
  • What is continuous testing in DevOps?
  • [Event] FOSSASIA Summit 2023 – Get your discounted ticket now

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • Artificial Intelligence
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About Us
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.