sb-eu logo
Story image

IoT, chip processors emerging as new cyber battlegrounds – report

05 Jun 2018

The number of types of ransomware variants in play increased by 101 percent in 2017, a report has found.

SonicWall’s Cyber Threat Report inferred that this may mark a pivot point for threat actors as they’ve exhausted the capabilities of standard ransomware and need a new approach.

The report gathered information from over a million security sensors in nearly 200 countries and territories.

Ransomware, in particular, has become part of the mainstream understanding of cybersecurity because of its ability to successfully and simultaneously target large organisations, small business, and individuals.

“The cyber arms race affects every government, business, organisation and individual. It cannot be won by any one of us,” says SonicWall CEO Bill Conner.

“Our latest proprietary data and findings show a series of strategic attacks and countermeasures as the cyber arms race continues to escalate.

“By sharing actionable intelligence, we collectively improve our business and security postures against today’s most malicious threats and criminals.”

To this end, Sonicwall has made the Cyber Threat Report widely available online.

The report contains critical insights that can help organisations leverage their strengths and resources to prepare better for threats.

  • Key advances in the security industry and cybercriminals
  • Exclusive data on the 2017 threat landscape
  • Security predictions for 2018
  • Cybersecurity guidelines and best practices
Story image
Why it’s essential to re-write IT security for the cloud era
Key components of network security architecture for the cloud era should be built from the ground up, as opposed to being bolted on to legacy solutions built for organisations functioning only on-premises or from only managed devices.More
Story image
Emotet malware is on a rampage after months of silence
CERT agencies around the world are reporting a surge in cyber attacks related to the Emotet malware, which is being distributed by email.More
Story image
Shlayer malware proves Apple devices aren't as secure as you think
"Apple never talks about malware publicly, and loves to give the impression that its systems are secure. Unfortunately, the opposite has been proven to be the case with great regularity."More
Story image
Research: 61% of companies have suffered an insider attack in last 12 months
It comes as rapid migration to cloud and remote working and BYOD scenarios leave organisations increasingly vulnerable to insider attacks as a result of the upheaval caused by the COVID-19 pandemic.More
Story image
Proofpoint and CyberArk extend partnership to further safeguard high-risk users
“Our CyberArk partnership extension provides security teams with increased detection and enhanced adaptive controls to help prevent today’s most severe threats."More
Story image
Exabeam and Code42 partner up to launch insider threat solution
The solution will give customers a fuller picture of their environment, and will leverage automated incident response to obstruct insider threat before data loss occurs.More