SlideShare a Scribd company logo
1 of 10
5 MAIN TRENDS
IN CYBER SECURITY
FOR
2020
INTRODUCTION
We are presenting five trends in cyber security,
which we have identified as the most important
in begun year.
The identified trends present that changes
in the area of security are always an evolution,
not a revolution. The one revolutionary trend is the
implementation of 5G technology with all its
consequences. However, even in this context it
is difficult to talk about completely new
categories of security problems. Digital espionage
or the 'childhood diseases' of the new standard
are issues that might have been expected as they
concern every innovative technology.
The selected trends show the slow improvement
of the successful activities of cybercriminals.
Ransomware has been around for several years.
Recently, a tendency to concentrate such attacks
on entities that are more willing to pay the
ransom than to accept the loss of data (e.g.
hospitals) has been observed. There has also
appeared a variant of ransomware attack, which
threatens the victims with publication of
compromising materials instead of losing access
to data.
Similar improvements of sinister actions are
visible in the case of manipulation of electoral
information and phishing. Here, a trend towards
improving the quality of processed materials
using machine learning techniques is visible.
Not all trends mean making IT security specialists’
life more complicated. Cloud computing,
perceived initially with a great mistrust, can
increase the security of a company. Replacing
conventional, difficult to maintain for IT
specialists, applications with cloud solutions
protected by large security teams can be
profitable. Cloud computing also provides
opportunities to create better quality security
training solutions and to scale them according
to a demand.
Enjoy the reading.
KRYSTIAN PIWOWARCZYK
CDEX CTO
01
02
03
04
05
CONTINOUS INCREASE IN RANSOMWARE
ATTACKS THREAT
ELECTORAL DATA MANIPULATION
THREATS (AND OPPORTUNITIES) OF CLOUD COMPUTING
MASS IMPLEMENTATION OF THE 5G STANDARD
INCREASE IN PHISHING ATTACKS
TABLE OF CONTENTS
Cybercriminals will likely move
beyond DoS attacks to
exploiting vulnerabilities, much
like the BlueKeep attacks where
hackers were able to use the
BlueKeep exploit to hack into
unpatched Windows systems to
install a cryptocurrency miner.
Healthcare providers and school
districts are particularly vulnerable
to ransomware threats as they
often run outdated software and
do not have adequate
cybersecurity resources. These
entities often have no choice but
to pay the ransom to keep vital
services running which encourages
the attackers even more. A new
trend among the attacks is
demanding ransom for not
publishing confidential data
on public services rather than
regaining access to them.
TRENDS 2020
CONTINOUS INCREASE IN
RANSOMWARE ATTACKS THREAT
Security experts will face
ransomware attacks more often.
This tendency is growing since
the infamous WannaCry incident
in 2017. A CNN article reported
that over 140 local governments,
police stations and hospitals
were held hostage by
ransomware attacks in 2019.
Cities as large as Baltimore and
New Orleans became
victims to such attacks.
According to Cybersecurity
Ventures until the end of
2020 ransomware attacks will
have taken place every 14
seconds and in 2021
every 11 seconds.
The form of attacks is evolving,
so that they can bypass most of
the conventional and
sophisticated solutions like
antivirus, firewalls,
and enterprise-level EDR.
CYBER SECURITY
They will first target presidential
candidates but will spread
to members of congress
and celebrities which will cause
confusion on the Internet. That’s
what the attackers want - to
cause social unrest and tension
by spreading the belief that there
has been manipulation, even if
the actual number of votes cast
for the candidates would
not be manipulated in any way.
This type of action
may also intensify in other
countries where elections will be
held this year: in Poland, France,
Taiwan and South Korea.
ELECTORAL DATA MANIPULATION
One of the most important events
in the world politics in 2020 is
the presidential election in the
US. In cybersecurity it means an
increase in criminal activities,
what was particularly visible
during presidential campaign in
the US in 2016.
Social media were flooded by
false stories and an alleged
violation of the state electoral
systems. Experts claim that
during this year’s elections state
and local databases and on-line
voting systems may become
victims to attacks. Social media
will be awash in fake news,
especially professionally made,
hard to distinguish from reliable
sources, deep fake videos aimed
at misleading voters.
TRENDS 2020CYBER SECURITY
According to researchers from
WatchGuard Technologies attacks
will be especially focused on the
medical sector and key
services which cannot afford
even the shortest downtime, such
as the energy, water and sewage
industry.
An opportunity for many
enterprises, including cyber
security departments, is the
increasing use of cloud computing
in the training area. The flexibility
of place and time of the training
creates favourable conditions that
employees are more willing to use.
This trend is favourable
from the perspective of the high
demand for highly qualified
IT security specialists.
THREATS (AND OPPORTUNITIES)
OF CLOUD COMPUTING
The trend of migrating from data
centres to cloud solutions, which
has been observed for several
years, will intensify
among both companies
and institutions. However
those changes do not coincide
with an increase in awareness
of adequate security. The quality
of configuration of network
devices and application servers
creates the risk of significant
leaks of critical data. According
to forecasts, IT security
specialists will have to face
more frequent phishing attacks
targeting cloud resources.
Important for preventing them
is focusing on securing email
services, as well as removing
potentially useful information
(e.g. API keys) in planning
an attack from the network.
Ransomware attacks that target
data stored in the cloud
may also increase.
TRENDS 2020CYBER SECURITY
TRENDS 2020
MASSIVE 5G IMPLEMENTATION
The 5G technology gives a wide
range of possibilities to create
completely new solutions, based
on the ability to transfer huge
amounts of data at low
latency. Companies that win
contracts to implement the 5G
technology in the world’s largest
countries can count on lucrative
cooperation. These struggles
have been visible for several years
now and have grown to the rank
of political confrontation. The
introduction of the 5G standard
is associated not only with
opportunities for the progress of
civilization, but also with
threats. The most
obvious risk is the release of
solutions with an unconfirmed
level of security. The risk
increases when solutions come
from suppliers who may be
subject to pressure from rival
countries. That mistrust is hardly
surprising. Secret access to
communication between citizens
of neighbouring countries is a real
‘Holy Grail’ of any intelligence
agency. Other threats are also
worth mentioning. The rush to
implement the 5G technology may
result in a number of ‘childhood
diseases’ at an early stage, which
in the area of cybersecurity will
mean the mass disclosure of
common vulnerabilities related
to a defective implementation (e.g.
DoS, jamming, spoofing, session
hijacking, data leakage). It cannot
be omitted that several completely
new security error classes are
created, exclusively related to the
5G standard. For this reason, at the
early stage of the 5G technology
implementation, it is extremely
important to conduct security
tests of solutions incorporating
the 5G standard.
Firstly, to exclude the possibility of
unauthorised access by adversaries
and secondly, to ensure that the
appliances used guarantee
a sufficient level of security.
CYBER SECURITY
TRENDS 2020
INCREASE IN PHISHING ATTACKS
A recent report by Europol found
that spear phishing is currently
the most frequent on EU
companies. This tendency will
continue. Microsoft predicts more
than double the number of
phishing attacks in 2020
compared to last year. The
most commonly used medium in
this type of attack is e-mail (at
least one in 99 e-mails is
currently an attack attempt,
often containing malware). The
use of voice calls (vishing) and
text messages (smishing) by
hackers is also increasing. Attacks
are becoming more and more
sophisticated and adapted to
authentic communication in the
company, and thus even more
difficult to detect. Social
networking sites are increasingly
becoming
the preferred channel of
communication with victims, due
to the growing use of this form of
communication by society.
As always, cybercriminals try to
reach a large number of potential
victims, but it is the increase in the
quality of messages prepared for
victims that ensures
their success. Popularization of
deep fake and techniques used
in its creation will certainly lead to
an increased interest in vishing
due to the increase in the
effectiveness of materials prepared
thanks to these techniques.
CYBER SECURITY
TRENDS 2020
Every 14 seconds in 2020
there are ransomware
attacks globally
14S 11.20
November 2020 is when
presidential election in the US
will have place, as well as
expected increase of fake news
5G
Availability of 5G network brings
new threats – among others
massive DDoS attacks
1/99
At least one in 99 e-mails 
in 2020 is a phishing attack
attempt
A massive migration of data
to cloud solutions leads to new
opportunities and threats
for IT security
CLOUD
CYBER SECURITY
CDeX Team
www.cdex.cloud
PREPARED BY:
TRENDS 2020CYBER SECURITY
Keep your people prepared

More Related Content

What's hot

Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsKory Edwards
 
Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Kim Jensen
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec
 
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Information Security Awareness Group
 
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...IJMIT JOURNAL
 
Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Javier Gonzalez
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-naAndreas Hiller
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0varun4110
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat ReportKim Jensen
 
Cscu module 11 security on social networking sites
Cscu module 11 security on social networking sitesCscu module 11 security on social networking sites
Cscu module 11 security on social networking sitesSejahtera Affif
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)naveen p
 
Mobile security hakin9_Revista
Mobile security hakin9_RevistaMobile security hakin9_Revista
Mobile security hakin9_Revistathe_ro0t
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperKen Spencer Brown
 
Grift horse money stealing trojan takes 10m android users for a ride
Grift horse money stealing trojan takes 10m android users for a rideGrift horse money stealing trojan takes 10m android users for a ride
Grift horse money stealing trojan takes 10m android users for a rideRoen Branham
 
2015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i32015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i3NTT Innovation Institute Inc.
 

What's hot (20)

Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety Communications
 
Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
 
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
 
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
 
Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-na
 
Istr19 en
Istr19 enIstr19 en
Istr19 en
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
 
Cscu module 11 security on social networking sites
Cscu module 11 security on social networking sitesCscu module 11 security on social networking sites
Cscu module 11 security on social networking sites
 
2013 Threat Report
2013 Threat Report2013 Threat Report
2013 Threat Report
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
Ey giss-under-cyber-attack
Ey giss-under-cyber-attackEy giss-under-cyber-attack
Ey giss-under-cyber-attack
 
Mobile security hakin9_Revista
Mobile security hakin9_RevistaMobile security hakin9_Revista
Mobile security hakin9_Revista
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
 
Grift horse money stealing trojan takes 10m android users for a ride
Grift horse money stealing trojan takes 10m android users for a rideGrift horse money stealing trojan takes 10m android users for a ride
Grift horse money stealing trojan takes 10m android users for a ride
 
2015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i32015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i3
 
Estado del ransomware en 2020
Estado del ransomware en 2020Estado del ransomware en 2020
Estado del ransomware en 2020
 

Similar to 5 main trends in cyber security for 2020

As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcMert Akın
 
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...SG Analytics
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shiftsmalvvv
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shiftsmalvvv
 
Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022ManviShukla4
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importancemanoharparakh
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Vertex Holdings
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfBrafton
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCognizant
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
 
CYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdfCYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdfKrishna N
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
Qrator Labs annual report 2017
Qrator Labs annual report 2017Qrator Labs annual report 2017
Qrator Labs annual report 2017Qrator Labs
 
The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022Bernard Marr
 
7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptxIT Company Dubai
 

Similar to 5 main trends in cyber security for 2020 (20)

As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwc
 
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
CYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdfCYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdf
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Qrator Labs annual report 2017
Qrator Labs annual report 2017Qrator Labs annual report 2017
Qrator Labs annual report 2017
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
 
The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022
 
7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 

5 main trends in cyber security for 2020

  • 1. 5 MAIN TRENDS IN CYBER SECURITY FOR 2020
  • 2. INTRODUCTION We are presenting five trends in cyber security, which we have identified as the most important in begun year. The identified trends present that changes in the area of security are always an evolution, not a revolution. The one revolutionary trend is the implementation of 5G technology with all its consequences. However, even in this context it is difficult to talk about completely new categories of security problems. Digital espionage or the 'childhood diseases' of the new standard are issues that might have been expected as they concern every innovative technology. The selected trends show the slow improvement of the successful activities of cybercriminals. Ransomware has been around for several years. Recently, a tendency to concentrate such attacks on entities that are more willing to pay the ransom than to accept the loss of data (e.g. hospitals) has been observed. There has also appeared a variant of ransomware attack, which threatens the victims with publication of compromising materials instead of losing access to data. Similar improvements of sinister actions are visible in the case of manipulation of electoral information and phishing. Here, a trend towards improving the quality of processed materials using machine learning techniques is visible. Not all trends mean making IT security specialists’ life more complicated. Cloud computing, perceived initially with a great mistrust, can increase the security of a company. Replacing conventional, difficult to maintain for IT specialists, applications with cloud solutions protected by large security teams can be profitable. Cloud computing also provides opportunities to create better quality security training solutions and to scale them according to a demand. Enjoy the reading. KRYSTIAN PIWOWARCZYK CDEX CTO
  • 3. 01 02 03 04 05 CONTINOUS INCREASE IN RANSOMWARE ATTACKS THREAT ELECTORAL DATA MANIPULATION THREATS (AND OPPORTUNITIES) OF CLOUD COMPUTING MASS IMPLEMENTATION OF THE 5G STANDARD INCREASE IN PHISHING ATTACKS TABLE OF CONTENTS
  • 4. Cybercriminals will likely move beyond DoS attacks to exploiting vulnerabilities, much like the BlueKeep attacks where hackers were able to use the BlueKeep exploit to hack into unpatched Windows systems to install a cryptocurrency miner. Healthcare providers and school districts are particularly vulnerable to ransomware threats as they often run outdated software and do not have adequate cybersecurity resources. These entities often have no choice but to pay the ransom to keep vital services running which encourages the attackers even more. A new trend among the attacks is demanding ransom for not publishing confidential data on public services rather than regaining access to them. TRENDS 2020 CONTINOUS INCREASE IN RANSOMWARE ATTACKS THREAT Security experts will face ransomware attacks more often. This tendency is growing since the infamous WannaCry incident in 2017. A CNN article reported that over 140 local governments, police stations and hospitals were held hostage by ransomware attacks in 2019. Cities as large as Baltimore and New Orleans became victims to such attacks. According to Cybersecurity Ventures until the end of 2020 ransomware attacks will have taken place every 14 seconds and in 2021 every 11 seconds. The form of attacks is evolving, so that they can bypass most of the conventional and sophisticated solutions like antivirus, firewalls, and enterprise-level EDR. CYBER SECURITY
  • 5. They will first target presidential candidates but will spread to members of congress and celebrities which will cause confusion on the Internet. That’s what the attackers want - to cause social unrest and tension by spreading the belief that there has been manipulation, even if the actual number of votes cast for the candidates would not be manipulated in any way. This type of action may also intensify in other countries where elections will be held this year: in Poland, France, Taiwan and South Korea. ELECTORAL DATA MANIPULATION One of the most important events in the world politics in 2020 is the presidential election in the US. In cybersecurity it means an increase in criminal activities, what was particularly visible during presidential campaign in the US in 2016. Social media were flooded by false stories and an alleged violation of the state electoral systems. Experts claim that during this year’s elections state and local databases and on-line voting systems may become victims to attacks. Social media will be awash in fake news, especially professionally made, hard to distinguish from reliable sources, deep fake videos aimed at misleading voters. TRENDS 2020CYBER SECURITY
  • 6. According to researchers from WatchGuard Technologies attacks will be especially focused on the medical sector and key services which cannot afford even the shortest downtime, such as the energy, water and sewage industry. An opportunity for many enterprises, including cyber security departments, is the increasing use of cloud computing in the training area. The flexibility of place and time of the training creates favourable conditions that employees are more willing to use. This trend is favourable from the perspective of the high demand for highly qualified IT security specialists. THREATS (AND OPPORTUNITIES) OF CLOUD COMPUTING The trend of migrating from data centres to cloud solutions, which has been observed for several years, will intensify among both companies and institutions. However those changes do not coincide with an increase in awareness of adequate security. The quality of configuration of network devices and application servers creates the risk of significant leaks of critical data. According to forecasts, IT security specialists will have to face more frequent phishing attacks targeting cloud resources. Important for preventing them is focusing on securing email services, as well as removing potentially useful information (e.g. API keys) in planning an attack from the network. Ransomware attacks that target data stored in the cloud may also increase. TRENDS 2020CYBER SECURITY
  • 7. TRENDS 2020 MASSIVE 5G IMPLEMENTATION The 5G technology gives a wide range of possibilities to create completely new solutions, based on the ability to transfer huge amounts of data at low latency. Companies that win contracts to implement the 5G technology in the world’s largest countries can count on lucrative cooperation. These struggles have been visible for several years now and have grown to the rank of political confrontation. The introduction of the 5G standard is associated not only with opportunities for the progress of civilization, but also with threats. The most obvious risk is the release of solutions with an unconfirmed level of security. The risk increases when solutions come from suppliers who may be subject to pressure from rival countries. That mistrust is hardly surprising. Secret access to communication between citizens of neighbouring countries is a real ‘Holy Grail’ of any intelligence agency. Other threats are also worth mentioning. The rush to implement the 5G technology may result in a number of ‘childhood diseases’ at an early stage, which in the area of cybersecurity will mean the mass disclosure of common vulnerabilities related to a defective implementation (e.g. DoS, jamming, spoofing, session hijacking, data leakage). It cannot be omitted that several completely new security error classes are created, exclusively related to the 5G standard. For this reason, at the early stage of the 5G technology implementation, it is extremely important to conduct security tests of solutions incorporating the 5G standard. Firstly, to exclude the possibility of unauthorised access by adversaries and secondly, to ensure that the appliances used guarantee a sufficient level of security. CYBER SECURITY
  • 8. TRENDS 2020 INCREASE IN PHISHING ATTACKS A recent report by Europol found that spear phishing is currently the most frequent on EU companies. This tendency will continue. Microsoft predicts more than double the number of phishing attacks in 2020 compared to last year. The most commonly used medium in this type of attack is e-mail (at least one in 99 e-mails is currently an attack attempt, often containing malware). The use of voice calls (vishing) and text messages (smishing) by hackers is also increasing. Attacks are becoming more and more sophisticated and adapted to authentic communication in the company, and thus even more difficult to detect. Social networking sites are increasingly becoming the preferred channel of communication with victims, due to the growing use of this form of communication by society. As always, cybercriminals try to reach a large number of potential victims, but it is the increase in the quality of messages prepared for victims that ensures their success. Popularization of deep fake and techniques used in its creation will certainly lead to an increased interest in vishing due to the increase in the effectiveness of materials prepared thanks to these techniques. CYBER SECURITY
  • 9. TRENDS 2020 Every 14 seconds in 2020 there are ransomware attacks globally 14S 11.20 November 2020 is when presidential election in the US will have place, as well as expected increase of fake news 5G Availability of 5G network brings new threats – among others massive DDoS attacks 1/99 At least one in 99 e-mails  in 2020 is a phishing attack attempt A massive migration of data to cloud solutions leads to new opportunities and threats for IT security CLOUD CYBER SECURITY
  • 10. CDeX Team www.cdex.cloud PREPARED BY: TRENDS 2020CYBER SECURITY Keep your people prepared