Tag Archive for: Highlights

INTERPOL Working Group highlights cyber threats across the Americas


Buenos Aires, Argentina – The evolving digital landscape in the Americas has increased the challenges and vulnerabilities regarding cybersecurity. Countries across the region now face cybercrime attacks ranging from Business Email Compromise and online scams to ransomware and money laundering.

Cybercrime Threat

Financially motivated groups have not only targeted organizations across Latin America, primarily with ransomware, but they have also broadened the scope of their operations. In the first half of 2020, Latin America for example recorded the world’s highest cyber-attack rates, with nearly three times more attacks via mobile browsers than the global average.  

For example, Costa Rica became the victim of large-scale ransomware attacks initiated by a group called Conti in April 2022. Starting in the Costa Rican ministry of finance, the cyber-assault ultimately involved 27 different ministries in a series of interlinked attacks. Conti’s action left parts of Costa Rica’s digital infrastructure crippled for months, while at the same time disrupting public healthcare and the pay of some public sector workers.

One of Argentina’s largest internet service providers, Telecom Argentina also suffered a major ransomware attack involving around 18,000 computers in 2020. In this incident, hackers demanded a $7.5 million ransom, while employees were prevented from accessing databases and internal VPNs.

In this context, the 7th INTERPOL Americas Working Group on Cybercrime met from 12-16 September in Buenos Aires, Argentina to assess threats and trends across the region. The meeting brought together over 90 participants from 32 member countries, 4 international organizations and 13 public and private entities.

Group photo of participants at 7th INTERPOL Americas Working Group on Cybercrime.

Opening remarks by Craig Jones, Director of Cybercrime, INTERPOL.

Opening remarks by Juan Carlos Hernandez, Chief of Argentinian Federal Police and Member of INTERPOL Executive Committee.

Source…

SonicWall threat report mid-year update highlights significant threat variance


The cyber threat landscape is continuing to become increasingly diverse. With COVID-19 and many geopolitical crises occurring worldwide, threat actors are capitalising on various cybersecurity gaps, and, as a result, enterprises and end users are often put at risk.

The 2022 SonicWall Cyber Threat Report mid-year update from SonicWall gives an in-depth insight into many of the current trends across the threat landscape. It has also revealed some alarming statistics about the state of enterprise security on the whole.

Concerningly, the report noted a 77% rise in IoT malware and a 132% leap in encrypted threats sent via HTTPS. Both of these pose significant threats to those with outdated and underutilised security resources, prompting a substantial call to action to further bolster security among organisations.

On a wider scale, 2.8 billion malware attacks (an increase of 11%) were recorded in the first half of 2022. This marked the first escalation of global malware volume in more than three years. 

Ransomware was also found to be a significant concern. Even in decline, year-to-date ransomware volume exceeded full-year totals of 2017, 2018 and 2019, sitting at 236.1 million for the first half of 2022.

And while the report notes many previously seen threats and groups, a significant increase of never-before-seen malware variants was also discovered by SonicWall, with the total increase being up 45%.

But while there are threats that are increasing at rapid rates, there are also many variations and declines as well. An overall drop in threats across the board of 23% was mentioned, signifying a change in the way threat actors are approaching targets.

SonicWall VP sales APJ Debasish Mukherjee says that this can sometimes become quite confusing for consumers and enterprises, as they do not know the best ways to protect themselves or where to focus their security resources.

“From year on year, what we are seeing is some types of threats are decreasing and some are increasing. This is often a little confusing for everyone, when sometimes we see that ransomware is increasing and malware is decreasing, or malware is increasing and ransomware is decreasing,” he says.

Mukherjee…

Source…

Enterprise Data Warehouse Market Research Report Highlights the Key Findings in the Area of Vendor Landscape, Key Market Segments, Regions, and Latest Trends and Drivers


The market structure is expected to remain fragmented during the forecast period. Vendors are deploying different organic and inorganic growth strategies to compete in the market.

  • Alphabet Inc.
  • Amazon.com Inc.
  • Cloudera Inc.
  • HCL Technologies Ltd.
  • International Business Machines Corp.
  • Microsoft Corp.
  • Oracle Corp.
  • SAP SE
  • Snowflake Inc.
  • Teradata Corp.

View more about the market’s vendor landscape highlights with a comprehensive list of vendors and their offerings.

Key Market Segmentation

The enterprise data warehouse market share growth by the cloud-based segment will be significant during the forecast period.

  • Deployment
  • Geography
    • North America
    • Europe
    • APAC
    • MEA

Request Sample Report of this report for more highlights into the market segments.

Regional Market Outlook

North America will account for 36% of the market’s growth. In North America, the US is the most important market for enterprise data warehouses. This region’s market will grow at a quicker rate than Europe, the Middle East, and South America. Over the projection period, the enterprise data warehouse market in North America would benefit from the technical maturity of numerous industries and the existence of many significant players.

Apart from regions, if we look at the country-wise market growth, US, China, UK, India, and Germany will contribute to the highest market growth.

Download our sample report for more key highlights on the regional market share of most of the above-mentioned countries.

Latest Trends, Driving the Global Enterprise Data Warehouse Market

  • Market Driver:
    • One of the primary enterprise data warehouse market development drivers is the proliferation of data across industries. The amount of data produced by industries is growing all across the world. Most businesses record and save both financial and non-financial transactions. The complexity and diversity of data sets grow as businesses become more digital. The majority of applications benefit from the adoption of business data warehouse solutions to increase data processing and analysis. As a result, the worldwide enterprise data warehouse market will develop in the future years due to the explosion of data across industries.
  • Market Challenge:
    • One of the…

Source…

Axie Infinity hack highlights DPRK cryptocurrency heists


Despite how enormous it was, the Axie Infinity heist marked only the latest chapter in the story of North Korean financial cybercrime.

Sky Mavis, the developer of popular nonfungible token (NFT) video game Axie Infinity, lost hundreds of millions of dollars in assets when they were stolen by hackers on March 23. The attack occurred via a breach of the Ronin bridge that exists as part of the Ronin Network sidechain (also developed by Sky Mavis).

The breach occurred when attackers gained control of a series of validator nodes attached to Axie Infinity to conduct fake withdrawals. Hackers stole 173,600 Ethereum and 25.5 million USD Coin, worth approximately $620 million at the time (and about $375 million as of this writing).

Three weeks after the initial attack and two weeks after it was disclosed, the FBI formally attributed the attack to the Lazarus Group and APT38, nation-state threat groups tied to the North Korean government.

The Axie Infinity heist is not the first cryptocurrency heist for the Democratic People’s Republic of Korea (DPRK). Blockchain analytics firm Chainalysis reported that last year that the country stole nearly $400 million in at least seven attacks against cryptocurrency platforms. The North Korean government also has a lengthy history with financially motivated cybercrime.

But the Axie Infinity hack represents an enormous theft on behalf of Kim Jong Un’s regime, and acts as the latest in a long line of big-game heists against cryptocurrency platforms.

The reason for these attacks, based on conversations with experts on both cryptocurrency and North Korea, appears to be a combination of opportunity and a highly adaptive offensive cyberoperation.

Sky Mavis
Axie Infinity artwork showcasing its virtual pet characters.

An unconventional nation-state threat

North Korea is a small, insular nation with an estimated population of 25 million people. Despite its size, the country’s enormous military and cybersecurity investments have made it one of the United States’ “big four” nation-state adversaries along with Russia, Iran and China.

CrowdStrike senior vice president of intelligence Adam Meyers told SearchSecurity last year that overwhelmingly, the goal of…

Source…