Cybersecurity solutions leader Trend Micro predicted an increase in the Internet of Things (IoT) vulnerabilities as more devices are manufactured without security regulations or industry standards.
Overall, the increased connectivity and enlarged attack surface present new opportunities for cybercriminals to leverage known issues to penetrate a corporate network, the company said in a statement.
“The ransomware attacks will manifest itself in a more ‘specialised’ and ‘targeted manner’, unlike the earlier approach. With respect to India, in 2018, we will experience more number of attacks targeted at the ATMs, especially malware attacks.
“We also expect to see a rise in security incidents across Public Cloud platforms,” said Nilesh Jain, Country Manager, India, and SAARC, Trend Micro.
Business Email Compromise (BEC) attacks will also continue to gain popularity with attackers, as the return on investment for successful attacks is quite high.
“We at Trend Micro are constantly scouting out future threats that will have the greatest impact for businesses, and we predict which vulnerabilities will make the biggest waves in the coming year,” said Rik Ferguson, Vice President of Security Research for Trend Micro.
Many devastating cyber attacks in 2017 leveraged known vulnerabilities that could have been prevented had they been patched beforehand.
“This trend will continue next year as corporate attack surfaces expand and expose more security holes. While this remains a challenge for enterprises, executives should prioritize vulnerability management as they make 2018 cybersecurity plans,” Ferguson cautioned.
Threat actors will also leverage growing technologies, like blockchain and machine learning, to enhance obfuscation against traditional cybersecurity protections in 2018.
To combat today’s expansive threats and be fortified against those yet to come, organizations should employ security solutions that allow visibility across all networks and that can provide real-time detection and protection against vulnerabilities and attacks. Any potential intrusions and compromise of assets will be avoided with a dynamic security strategy that employs cross-generational techniques appropriate for varying threats. These security technologies include:
- Real-time scanning. Active and automatic scans allow highly efficient malware detection and improved machine performance.
- Web and file reputation. Malware detection and prevention through web reputation, anti-spam techniques, and application control protect users from ransomware attacks and exploits.
- Behavioral analysis. Advanced malware and techniques that evade traditional defenses are proactively detected and blocked.
- High-fidelity machine learning. Human inputs augmented with threat intelligence data allow rapid detections and accurate defenses against known and unknown threats.
- Endpoint security. Security that employs sandboxing, breach detection, and endpoint sensor capabilities detect suspicious activities and prevent attacks and lateral movement within the network.