Tag Archive for: growing

Cyber Security Software Market is Growing Globally Forecast 2023-2028


The MarketWatch News Department was not involved in the creation of this content.

Mar 06, 2023 (The Expresswire) —
Final Report will add the analysis of the impact of COVID-19 on this industry.”

The Cyber Security Software Market 2023 Report provides statistical data on historical and current status, manufacturing cost, volume, share, size and growth. A major trend in the global Cyber Security Software industry is to provide product categories such as type [Network Security, Cloud Security, Wireless Security, Others] and application [Aerospace, Government, Financial Services, Telecommunication] to the rapidly growing industry. Successful marketing strategies, contributions and recent developments of key players, various methodologies and analysis are explained in this research report.

Global Cyber Security Software Market Report (122 Pages) provides exclusive vital statistics, data, information, trends and competitive landscape details in this niche sector.

Get a sample PDF of the report at – https://www.marketresearchguru.com/enquiry/request-sample/20101073

The global Cyber Security Software market size was valued at USD 2286.25 million in 2022 and is expected to expand at a CAGR of 11.54Percent during the forecast period, reaching USD 4402.7 million by 2029.
Internet security or cyber security is a branch of computer security specifically related to internet. The Internet has given rise to new opportunities almost in every field such as business, sports, education or entertainment and many others. However, the internet has its own drawbacks like cyber crime, where the computer used for various types of thefts and crime. Various types of cyber crimes include hacking, software piracy, denial of service attack, and cyber terrorism. The purpose of cyber security is to establish rules and measures to use against cyber crimes over the internet.

The report combines extensive quantitative analysis and exhaustive qualitative analysis, ranges from a macro overview of the total market size, industry chain, and market dynamics to micro details of segment markets by type, application and region, and, as a result, provides a holistic view of, as well as a deep insight into…

Source…

Kaspersky launches XDR platform to combat growing ransomware threats in Southeast Asia


  • Kaspersky has responded to the increased risk of targeted ransomware attacks on businesses in SEA by introducing the Kaspersky Extended Detection and Response (XDR) platform.
  • Kaspersky’s latest data indicates that Lockbit, a targeted ransomware group, attacked 115 businesses in SEA.

Digital kidnappers are targeting enterprises in Southeast Asia (SEA), and global cybersecurity company Kaspersky predicts that this trend will continue in the coming years, albeit in more sophisticated and targeted ways. Ransomware, a type of malware that locks computer and mobile devices or encrypts electronic files, is used by cybercriminals to demand a ransom in exchange for a decryption key or the return of data.

Ransomware has evolved as a threat since the first known attack in 1989; and since 2016, attackers have shifted from targeting users to larger enterprises. High-impact incidents, such as the WannaCry ransomware attack, have caused estimated damages of up to US$4 billion. Ransomware groups continue to target enterprises worldwide, including those in SEA, due to the high return on investment.

Kaspersky warns about the advancements in ransomware

Kaspersky is taking proactive steps to combat the escalating danger of targeted ransomware attacks on businesses in Southeast Asia. Its latest move is the introduction of the Kaspersky Extended Detection and Response (XDR) platform, which offers comprehensive protection against such attacks through its multi-layered defense mechanisms. Kaspersky reports that there has been a significant increase of almost 181% in daily ransomware attacks worldwide in the last year, resulting in approximately 9,500 encrypted files per day.

The attackers behind these attacks constantly improve their tactics and tools to demand higher ransoms and create a greater reputational impact. In 2020, Kaspersky warned of the rise of Ransomware 2.0, which employs highly targeted attacks and “pressure tactics” to achieve these goals.

Targeted ransomware groups have emerged as a new form of extortion in the past two years, using tactics such as reselling hacked data or files, conducting DDoS attacks, and launching targeted phishing campaigns. This tactic has been dubbed Ransomware…

Source…

Need for data security in the growing digital landscape of India


Reports claim that there has been a stark increase in the rate of cybercrimes in the country due to reasons such as increase in online traffic, lack of awareness, lack of technical knowledge among police and people, and difficulties in investigating cybercrime cases. As per a Norton report, India faced over 18 million cyber threats in the first quarter of 2022. October is celebrated as Cybersecurity Awareness Month. To celebrate the occasion and create awareness of securing the virtual world TimesTech interacted with Mr. Keshav Kaushik, Assistant Professor, School of Computer Science, UPES to get many of your questions answered.

TimesTech: What is the current scenario of cyberattacks and ransomware?

Keshav: An important activity of our contemporary twenty-first century has undergone a metamorphosis in the age of globalization thanks to Internet banking or electronic transfers. People have created a variety of means of communication for sharing knowledge, which is crucial for them as social creatures. The development of e-banking technology makes the process very simple, which also speeds up financial operations to a click. Daily banking is quick and easy with online and mobile banking. Cybercrimes on a national and worldwide scale were born due to the misuse of information technology in cyberspace. There are more hazards and difficulties involved with it overall. Online and mobile banking, however, is never completely secure. In 2020, cyberattacks were ranked as the fifth greatest danger and have now established themselves as the standard in both the private and the public sectors. As IoT cyberattacks are anticipated to increase by 2025, this dangerous business is projected to continue expanding in 2022. The COVID-19 epidemic has caused a 600% increase in cybercrime, which encompasses fraud or embezzlement to data tampering and destruction. Each sector has had to adopt new technologies, which has compelled businesses to act rapidly to adapt. If you are one of the many who manage a growing business, you are aware that the environment is always evolving and that, to put it mildly, 2020 saw several changes.

Ransomware…

Source…

The growing threat of CEO fraud and how to mitigate it


CEO fraud is a type of financial theft attack in which criminals impersonate a CEO or other C-level executive to obtain sensitive data or money. The perpetrators often trick a finance or human resources employee into executing unauthorised money transfers or sending confidential tax and payroll information. By posing as the CEO or other senior figures, the attacker guarantees that the malicious email gets employees’ attention. Many employees are reluctant to question a request from their CEO, so they usually provide the information.

The U.S. Federal Bureau of Investigation (FBI) categorises CEO fraud as a business email compromise (BEC) scam. BEC uses various techniques, including social engineering, compromising legitimate business email accounts, malicious software to access inboxes, and other computer intrusion tactics.

A growing threat

The number and impact of BEC scams continue to increase. The FBI reported a 65% increase in global losses from BEC between July 2019 and December 2021. According to the same report, data collected from the FBI Internet Crime Complaint Center, law enforcement, and financial institutions revealed that the scams cost victims more than USD $43 billion in 2021 and involved fraudulent transfers to banks from over 140 countries.

Breach reporting is not always mandatory, meaning the actual numbers could be much higher. Many victims are also embarrassed to report these cybercrimes as they may feel foolish and want to avoid reputational damage. The criminals rely on this shame to mask the staggering losses resulting from BEC.

Identifying and compromising CEOs

The perpetrators use platforms like LinkedIn and company websites to identify CEOs and senior executives and obtain their contact details. They then use email or messaging platforms such as WhatsApp to contact the targets and attempt to hijack their accounts. With a stolen email or messaging account, the attacker has access to the executive’s contacts and can use the same scam with CEOs and senior executives at other companies.

Spoofing sender details

There are two common tactics for manipulating sender information in CEO fraud emails:

  • In name spoofing, the attacker uses the name of the…

Source…