Connect with us

Hi, what are you looking for?

HEADLINES

Fortinet unveils predictions from FortiGuard Labs’ threat predictions for 2021

For the year 2021 and beyond, cybercriminals will leverage edge computing, 5G-enabled devices, and advances in computing performance and connectivity to create new and advanced threats at unprecedented speed and scale.

The ever-changing security landscape faces new threats every year as cyberattackers evolve their approach, using a range of techniques to get into businesses and organizations. When a technique they used fails, they move on to the next, until they find a weak spot. 

As the year 2020 draws to a close, cybersecurity solutions provider Fortinet unveiled predictions from the FortiGuard Labs’ threat predictions for 2021. These predictions reveal tactics that Fortinet expects cybercriminals will leverage in the near future as well as trends that can be expected to see in the coming years.  

For the year 2021 and beyond, cybercriminals will leverage edge computing, 5G-enabled devices, and advances in computing performance and connectivity to create new and advanced threats at unprecedented speed and scale.

Intelligent edge environments such as WAN, multi-cloud, data center, remote workers, IoT, and more, which replaced traditional networks will be the target of attackers. While these edges are interconnected, many organizations have sacrificed centralized visibility and unified control in favor of performance and digital transformation. Thus, this becomes an advantage for cyber criminals to target these environments using the speed and scale possibilities 5G will enable.

Apart from this, cyber adversaries will continue to shift significant resources to target and exploit emerging network edge environments such as remote workers, the cloud or even OT edge environments, rather than just targeting the core network. Besides, advanced malware could also discover more valuable data and trends using new EATs (Edge Access Trojans) and perform invasive activities such as intercept requests off the local network to compromise additional systems or inject additional attack commands.

Advertisement. Scroll to continue reading.

Deploying 5G-enabled devices opens up opportunities for more advanced threats such as swarm-based attacks. Leveraging hijacked devices divided into subgroups, these attacks target networks or devices as an integrated system and share intelligence in real time to refine attack as it is happening.

Smart devices will no longer be targets for attacks but will also be conduits for deeper attacks. Leveraging users’ important information such as daily routines and financial information could make social engineering-based attacks more successful. Smarter attacks can now enable the ransoming and extortion of additional data.

As ransomware continues to evolve, and IT systems increasingly converge with OT systems, particularly critical infrastructure, more data, devices and unfortunately lives will be at risk. Human lives will be at risk when field devices and sensors at the OT edge which include critical infrastructure, increasingly become targets of cyber criminals in the field.    

Innovations in computing performance and connectivity will also be targeted for adversaries’ gains. By attacking these innovations, cybercriminals would be able to process massive amounts of data, and learn how and when edge devices are used.

Regarding quantum computing, this innovation could create a new risk when it eventually is capable of challenging the effectiveness of encryption in the future. With enormous compute power, quantum computers could render some asymmetric encryption algorithms solvable. As a result, organizations will need to prepare to shift to quantum-resistant crypto algorithms by using the principle of crypto agility to ensure the protection of current and future information.

Advertisement. Scroll to continue reading.

Artificial Intelligence (AI)-driven technology will be critical to defend against future attacks. This technology needs to evolve to the next generation that can see, anticipate, and counter attacks as cyber attacks of the future will occur in microseconds. Threat actor playbooks or those tactics, techniques and procedures (TTPs) by threat criminals can be fed to AI systems to enable the detection of attack patterns.  

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

The agreement marks a significant step in the evolution of Carbon Markets 2.0, as governments and investors increasingly demand real-time verification, auditability, and transparency across...

HEADLINES

Cybersecurity experts urge users to be particularly cautious this year, as AI enables even more realistic scams, and are offering tips on how to...

HEADLINES

Built around the Sophos Protected Browser, powered by Island, the solution enables organizations to protect applications, data, users, and guests wherever work takes place,...

HEADLINES

Filipino consumers exhibit the highest “willing-to-wait” threshold, expecting their issues to be resolved in 27.3 minutes on average, compared to the APJ average of...

HEADLINES

Sophos X-Ops explores a malvertising campaign that leverages Google Ads to distribute an infostealer.

HEADLINES

Not everyone needs the same level of privacy. This new layer gives you the choice to decide what works best for you.

Biz Solutions

The platform leverages advanced AI and Generative AI to ingest, analyze, and act on diverse data streams from transactions and device telemetry to geolocation...

HEADLINES

This commitment of support aligns with Maya’s broader approach to cybersecurity, treating protection as a core priority across both platform safeguards and consumer education.

Advertisement