Cheat sheets

Top Cybersecurity Threats in 2019

Share this with people that should know this:

The cyberspace is a big threat environment and can pose a great danger if you do not have the needed cybersecurity measures and a high level of user awareness.

The improvement and development of new techniques are visible in all areas of the digital world. It is not different with Internet security, both in terms of threats and protection. New threats to cybersecurity appear every day and attacks are more frequent.

To be sure, you must be aware of the most common cybersecurity threats.

Ransomware : As the name suggests, Ransomware is a type of malicious software or malware that threatens to publish the victim’s data or permanently block owner access to it unless a ransom price is paid.

Cisco cybersecurity report 2018, it is said that:

"One of the most important developments in the attack landscape in 2017 was the evolution of ransomware . The advent of network-based worms ransomware eliminates the need for the human element in launching ransomware campaigns. And for some adversaries, the prize is not a rescue, but the destruction of systems and data. We expect to see more of this activity in 2019."

Artificial Intelligence : One of the main axes of cybercrime for 2019 is Artificial Intelligence, since it will be presented in the form of a programming of algorithms to optimize the making and execution of decisions to favor the interests of the attackers and to compromise the activity of the companies.

Cryptomining : Hackers work hard to perform strategic cyber attacks, and they do not do it for fun. The main objective is almost always the same: to make money.

That’s why they tend to focus on finding ways to steal you directly, or to do something even sneakier: exploit yourself as your workforce.

Let’s look at how this works exactly:

  • A hacker tricks you to download / install a cryptographer.
  • They use the processing power of your computer.
  • Your computer becomes a mine of cryptocurrencies.
  • You have no idea what is happening.
  • The only symptom is that your PC is slowing down.

This is how your computer becomes a money machine for the hacker and you are not aware of it.

Banking Malware in mobile applications: The banking Trojans are one of the most dangerous threats within the community or organization. Users download banking Trojans through mobile applications.  In most cases, cybercriminals pose as legitimate mobile applications to deceive users. These types of Trojans are becoming more frequent and it is estimated that they will continue to increase for the year.

Internet of Things (IoT) Vulnerabilities : With the advance of the Internet of Things (IoT) in 2018 and its consolidation in subsequent years, the devices and systems that can be violated have multiplied, thus creating more weak points for the attackers.

Mobile attacks and threats : A rising trend will be attacks from mobile devices to access data and systems of companies that have been protected in the cloud.

New APT Attacks : If there is one thing that is certain, cybercriminals will continue to grow and search for new platforms to attack, be they tablets, mobiles, IoT devices or network devices; as well as developing new applications to achieve it more easily.

Phishing and CEO fraud : A high percentage of cyber attacks begin with a phishing. A type of social engineering whose objective is to obtain confidential information in a fraudulent manner (such as passwords or banking information).

For this the attacker impersonates the identity of a person or company by means of an electronic mail. In recent years the rate of phishing incidents has not stopped increasing. In addition, the concern for 2019 grows in the sense that the methods used are increasingly sophisticated .

Cybersecurity has been affected by a particular case is the so-called “CEO Fraud”. This technique consists of an email that the attackers send to employees of the company, supplanting the identity of the executive director.

Cybersecurity threats in Cloud environments : Cloud computing environments,  that is, remote access to software , files, etc. They have transformed the way we live and work, but it has also given cybercriminals a broader attack surface. Simultaneously it has led to a large number of new cybersecurity threats and vulnerabilities.

Attacks on the supply chain : This is one of the most worrisome attack vectors that have been successfully exploited over the last two years, which has put the issue of supplier safety on the table. In 2019 it will continue to be an effective vector of infection.

Share this with people that should know this: