Check Point Software’s Mid-Year Security Report Reveals 42%

SAN CARLOS, Calif., Aug. 03, 2022 (GLOBE NEWSWIRE) — Check Point Research (CPR), the threat intelligence arm of Check Point® Software Technologies Ltd. ‘ Country extortion and state-affiliated hacktivism, and the spread of ransomware as the number one threat.

Along with an overview of the evolution of cyberattacks as a state-level weapon complementing actual military conflicts, and the rise of ransomware used in state-level attacks for financial and social gain, the report also delves into the growth of cloud supply chain attacks thanks to new sources of modules in the open-source community.

Up-to-date industrial and regional cyberattack statistics along with guidance and forecasts for the remainder of 2022, including incident response analysis exploring the full lifecycle of a cyberattack, present an integrated view of how whose cyberattacks have caused major disruptions, causing real harm to civic and cyber life in 2022.

“The war in Ukraine has been in the headlines during the first half of 2022 and we can only hope that it will soon be brought to a peaceful conclusion,” said Maya Horowitz, vice president of research at Check Point. Software. “Its impact on cyberspace has been dramatic in both scope and scale, and this year we have seen a dramatic increase in cyberattacks against organizations across all industries and countries. Unfortunately, this is only going to get worse. , especially since ransomware is now the number one threat to organizations.However, with the right expertise, strategy and cybersecurity solutions in place, businesses are able to prevent attacks from happening. .

Key predictions for H2 highlighted in the report include:

  • Ransomware will become a much more fragmented ecosystem – while ransomware groups have become more structured and operate like regular businesses, with set goals to achieve, there will be a lesson to be learned from the Conti ransomware group, whose size and power have attracted too much attention , which led to his downfall. In the future, we believe there will be many small and medium groups instead of a few large ones, to more effectively hide in plain sight.
  • More diverse email infection chains – due to the implementation of Internet macros blocked by default in Microsoft Office, the most sophisticated malware families will accelerate the development of new infection chains, with different types of password-protected files to prevent detection as sophisticated social engineering attacks increase.
  • Hacktivism will continue to evolve – hacktivist groups will continue to align their attacks with the nation-state agenda of their choice, especially as the Russian-Ukrainian war is still ongoing.
  • Continued Attacks on Decentralized Blockchain Networks with First Attacks Expected in Metaverse – with major incidents related to blockchain platforms, such as a vulnerability in the Rare Marketplace Where ApeCoin Airdrop Vulnerability , we expect to see continued efforts by hackers to breach and hijack crypto assets. Additionally, we believe we will see initial attacks in the Metaverse that exploit vulnerabilities in smart contracts.

The “Cyber ​​Attack Trends: 2022 Mid-Year Report” provides a detailed overview of the cyber threat landscape. These findings are based on data pulled from Check Point Software’s ThreatCloud Intelligence between January and June 2022, highlighting the top tactics used by cybercriminals to attack businesses. A full copy of the report is available from here.

Follow Check Point Research via:
Blog: https://research.checkpoint.com/
Twitter: https://twitter.com/_cpresearch_

About Check Point Research
Check Point Research provides cutting-edge cyber threat intelligence to Check Point Software customers and the wider intelligence community. The research team collects and analyzes global cyberattack data stored on ThreatCloud to keep hackers at bay, while ensuring that all Check Point products are updated with the latest protections. The research team consists of more than 100 analysts and researchers cooperating with other security vendors, law enforcement and various CERTs.

About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (checkpoint.com) is a leading provider of cybersecurity solutions for businesses and governments worldwide. Check Point Infinity’s portfolio of solutions protects businesses and public organizations against 5e generation-to-generation cyberattacks with an industry-leading capture rate of malware, ransomware and other threats. Infinity comprises three main pillars delivering uncompromising security and Generation V threat prevention in enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and data centers, all controlled by the industry’s most comprehensive and intuitive unified security management. Check Point protects more than 100,000 organizations of all sizes.



Source link