31.01.2023 Views

Cyber Defense eMagazine February Edition for 2023

Cyber Defense eMagazine February Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine February Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

With difficult decisions ahead, here are four cybersecurity trends that organizations should prepare <strong>for</strong> in<br />

<strong>2023</strong>:<br />

1. Rising costs may trigger an influx of cyber hustlers and money mules, fueling the<br />

cybercrime economy and putting users at risk.<br />

With its shift to plat<strong>for</strong>m business models, the cybercrime gig economy has made cybercrime easier,<br />

cheaper, and more scalable. <strong>Cyber</strong>crime tools and mentoring services are af<strong>for</strong>dable and plentiful,<br />

enticing cyber hustlers – opportunists with low levels of technical skill – to access what they need to turn<br />

a profit. As we face another global downturn, easy access to cybercrime tools and know-how could<br />

increase the number of scam SMS messages and emails we see in our inboxes. Drawn by the promise<br />

of quick money, we may also see more people recruited into money-muling schemes, inadvertently<br />

fueling the cybercrime economy by enabling cybercriminals to launder ransom payments and fraudulent<br />

transactions.<br />

As an industry, we know that email is the most common attack vector, particularly <strong>for</strong> opportunists looking<br />

to make money fast like cyber hustlers, who favor simpler techniques like scams and phishing. The<br />

interconnectedness of the cybercrime ecosystem means threat actors can easily monetize these types<br />

of attacks. And if they strike gold and compromise a corporate device, they can sell that access to bigger<br />

players, like ransomware gangs. This all feeds into the cybercrime engine, giving organized groups even<br />

more reach.<br />

As attacks against users increase, having security built into devices from the hardware up will be essential<br />

to prevent, detect and recover from attacks. Fostering a healthy security culture is vital <strong>for</strong> building<br />

resilience – but only when combined with technology that reduces an organization’s attack surface. By<br />

isolating risky activities like malicious emails, entire classes of threats can be eliminated without relying<br />

on detection. Threat containment technologies ensure that if a user opens a malicious link or attachment,<br />

the malware can’t infect anything. This way organizations can reduce their attack surface and protect<br />

employees without hindering their workflows.<br />

2. Established hackers to invest in advanced attacks below the operating system.<br />

In <strong>2023</strong>, organizations should take control of firmware security. Once, firmware attacks were only used<br />

by highly advanced threat groups and nation states. But over the last year, we’ve seen early signs of<br />

increased interest and development of attacks below the operating system in the cybercrime underground<br />

– from tools to hack BIOS passwords, to rootkits and trojans targeting a device’s firmware. We now see<br />

firmware rootkits advertised on cybercrime marketplaces <strong>for</strong> a few thousand dollars.<br />

Advanced threat actors are always aiming to keep their attack capabilities ahead of the curve.<br />

Un<strong>for</strong>tunately, organizations often overlook firmware security, creating a large attack surface <strong>for</strong><br />

adversaries to exploit. Access to the firmware level enables attackers to gain persistent control and hide<br />

below the operating system, making them very hard to detect – let alone remove and remediate.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2023</strong> <strong>Edition</strong> 58<br />

Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!