Topics In Demand
Notification
New

No notification found.

Blog
Cyber Security Threats to Look For in 2020

February 26, 2020

995

0

Cyber Threats to Look For in 2020

With the advent of new technologies, the doors of complex cybersecurity challenges have opened. This advancement has provided cyber criminals with thousands of opportunities to exploit and damage an organisation’s cybersecurity infrastructure. The year 2019 had some worst data breaches. 2020 is going to be a challenging year for the businesses, organisations and governments as the advanced cyber attacks are expected to rise.

Let us have a look at some of the top cybersecurity threats to watch out for in 2020.

  1. Over the last decade, Internet-connected smart devices used in offices and homes have proliferated. Most of these devices do not have enough security features installed, which allows attackers to coerce the device and enter the network.
  2. All through 2019, ransomware kept standing out as truly newsworthy and will continue to be a prevalent threat in 2020. It is still the most reliable way for hackers to make money.
  3. Deepfake attacks have shown remarkable growth in the past few years. With the help of advanced analytics technology, Generative Adversarial Networks (GANs), the threat actors can now produce fake but incredibly realistic videos and images that are difficult for humans to identity. In 2020, Deepfake attacks are likely to be an insidious threat to the cyber security landscape.
  4. Since Microsoft has announced that the support and updates for Windows 7 will not be available after January 14 2020, the probability of cyber attacks are likely to increase in 2020.
  5. Recently, a major security flaw was observed in the Huawei MateBook systems running the company’s PCManager software. The software comprised an insecure driver that allowed underprivileged users to create processes with high-level privileges. Such loopholes let attackers to exploit the vulnerability and circumvent the device’s security by using asynchronous procedure calls to further interrupt system processes and run malicious code.
  6. Since 2016, web-skimming (or e-skimming) attacks have compromised thousands of e-commerce websites to collect customers payment card information. Over the time, the threat actors performing e-skimming attacks have also evolved and are ready to target small- and medium-sized businesses as well as government agencies.
  7. With the recently developed malicious rootkits, the hacktivists will now attempt to compromise the supply chain of legitimate software packages by deploying hard-to-detect malware. The level of associated risk is high as the implanted malware would be difficult to remove even after formatting the system.
  8. Threat actors are now exploring the innovations in technology to create a new wave of cyber attacks involving machine learning and artificial intelligence. They have developed a new AI-powered malware that has the potential to automate human skills and processes, and can significantly increase the scale of damage caused by malware attacks.
  9. The advent and global adoption of 5G infrastructure technology will bring a new wave of 5G compatible devices, which would demand more security. Accordingly, the companies will be required to reassess their security paradigms for providing a secure and reliable mobile platform.
  10. As an alternative to email, the hackers are now using interactive social media platforms like WhatsApp, Facebook, Instagram and LinkedIn to entice victims into immediate actions such as calling a deceitful contact number, visiting a malicious website or downloading files containing mobile malware. Such attacks are now becoming an emerging threat to the cyber space.

 


That the contents of third-party articles/blogs published here on the website, and the interpretation of all information in the article/blogs such as data, maps, numbers, opinions etc. displayed in the article/blogs and views or the opinions expressed within the content are solely of the author's; and do not reflect the opinions and beliefs of NASSCOM or its affiliates in any manner. NASSCOM does not take any liability w.r.t. content in any manner and will not be liable in any manner whatsoever for any kind of liability arising out of any act, error or omission. The contents of third-party article/blogs published, are provided solely as convenience; and the presence of these articles/blogs should not, under any circumstances, be considered as an endorsement of the contents by NASSCOM in any manner; and if you chose to access these articles/blogs , you do so at your own risk.


TASLCyberPractice

© Copyright nasscom. All Rights Reserved.