Tag Archive for: technologies

Evolving Landscape Of Cyber Threats Needs Robust Defence Mechanisms Sanjay Katkar Quick Heal Technologies


In today’s digital age, where technology has permeated every aspect of our lives, the importance of cybersecurity cannot be overlooked, as cyber threats have become increasingly sophisticated and pervasive. Constantly evolving tactics, the use of advanced techniques such as ransomware, phishing attacks and data breaches to target individuals, businesses and even governments are rampant.

Sophos’s report “The State of Ransomware 2021” states that in 2020, the average cost of a ransomware attack on businesses reached close to Rs 8.5 crore, a 200 per cent increase from the previous year. While, the “Cost of a Data Breach Report 2020” by IMB security revealed that in 2020, the average data breach cost was USD 3.86 million and it took an average of 280 days to identify and contain a breach.

According to Microsoft’s Global Tech Support Scam Research, 31 per cent of Indians lost money to cyberattacks in 2022. Every day, citizens in the state of Gujarat alone collectively lose Rs 1 to 1.2 crore to online financial fraud, according to the cyber cell of Gujarat CID. Thus, the consequences of these attacks can be devastating, ranging from financial loss to reputational damage and, in some cases, even endangering lives.

Expanding Attack Surfaces

According to Sanjay Katkar, Joint Managing Director of Quick Heal Technologies, “One of the key challenges in today’s cybersecurity landscape is the ever-expanding attack surface. With the proliferation of Internet of Things (IoT) devices, cloud computing and the widespread adoption of mobile devices, we have seen an exponential increase in the number of entry points for cybercriminals to exploit. Mobile device usage has become pervasive.”

According to Statista’s report on the number of smartphone users worldwide from 2016 to 2023, as of 2021, there were over 3.8 billion smartphone users worldwide which is expected to reach 4.3 billion by 2023.

The number of IoT devices is also increasing at a rapid pace. By 2025, there will be over 75 billion connected IoT devices worldwide, as per Statista’s report on “Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025.” It is essential for organisations…

Source…

Inside the Mind of the Hacker: Report Shows Speed and Efficiency of Hackers in Adopting New Technologies


The application of artificial intelligence is still in its infancy, but we are already seeing one major effect: the democratization of hacking.

The annual Bugcrowd report, Inside the Mind of a Hacker 2023, examines the attitudes held and methods used by the Bugcrowd pool of bug hunters. This year, the report focuses on the effect and use of artificial intelligence (AI) by hackers.

It also provides valuable insight into how malicious hackers will employ AI. For now, this is centered around the use of LLM GPTs, such as ChatGPT. There are numerous ‘specialist’ GPTs appearing, but for the most part they are wrappers around the GPT4 engine. ChatGPT remains the primary tool of hackers.

Seventy-two percent of Bugcrowd’s hackers do not believe AI will ever replicate their human creativity. Despite this, 64% already use AI in their hacking workflow, and a further 30% plan to do so in the future. “I agree completely with the majority that [AI] will not replace the security researchers/hacker,” says Timothy Morris, chief security advisor at Tanium. “Hacking requires skill (AI has that) but also creativity that comes from understanding context (AI does not have that). While AI may get better over the years, I don’t see it as a replacement.”

Nevertheless, it is the combination of human creativity with AI workflow support that is changing the face of hacking – and while that is good in the hands of ethical hackers, it is concerning in the hands of malicious hackers.

According to the report, which analyzed roughly 1,000 survey responses from hackers on the Bugcrowd Platform, hackers are already using and exploring the potential of AI in many different areas. The top use cases are currently automating tasks (50%), analyzing data (48%), identifying vulnerabilities (36%), validating findings (35%), conducting reconnaissance (33%), categorizing threats (22%), detecting anomalies (22%), prioritizing risks (22%), and training models (17%). 

To achieve these ends, hackers have been treating AI as just another tool in their toolset. The first requirement is to understand the tool, and the second is to learn how to use it. With ChatGPT, this falls into two categories –…

Source…

Australia Cyber Security Market Outlook 2023 to 2027: Featuring Akamai Technologies, CyberCX, McAfee Enterprise Among Others


DUBLIN, June 28, 2023 /PRNewswire/ — The “Australia Cyber Security Market Outlook to 2027F” report has been added to ResearchAndMarkets.com’s offering.

The report provides a comprehensive analysis of the potential of cyber security industry in Australia. The report covers an overview and genesis of the industry, market size in terms of revenue generated.

Its market segmentations include by component, security, deployment type, region, organization type, and industry; growth enablers and drivers; challenges and bottlenecks; trends driving adoption trends; regulatory framework; end-user analysis, industry analysis, competitive landscape including competition scenario and market shares of major players. The report concludes with future market projections of each market segmentation and analyst recommendations.

Market Overview:

IoT devices have a security system that is vulnerable to cyberattacks. It is not designed to pre-detect or prevent threats, such as hacking. Thus, these devices could be prime targets for hackers to obtain usernames and passwords and access other confidential information.

The quantity of personal information and transaction data that all Australian firms have on hand is growing. Sensitive data is frequently exposed due to organizational system weaknesses, making these firms the prime targets of cyberattacks.

Key Trends by Market Segment:

  • By Deployment Type: Cloud segment contributed to the highest share, and it is attributed to increasing technological integration and surging digital usage by consumers post COVID-19
  • By Component: Entities generally approach a cybersecurity service provider to take care of various functions rather than standalone hardware and software. Therefore, the revenue contribution is higher for services

Competitive Landscape

Australia Cyber Security Market is at a growing stage and has a moderately fragmented market with more than 15 players in the market that adopt strategic initiatives such as partnerships, investments, and new product offerings due to increasing awareness regarding mobility security among enterprises. IBM, Akamai Technologies, Context Information Security, iSight Partners, NCC Group, Ping Identity, CyberCX, McAfee Enterprise

Source…

The Growing Importance of IoT Security in Cybersecurity Technologies


The Growing Importance of IoT Security in Cybersecurity Technologies

The Internet of Things (IoT) has rapidly become an integral part of our daily lives, with billions of interconnected devices ranging from smart home appliances to industrial sensors. This vast network of devices generates an enormous amount of data, providing valuable insights and enabling automation in various sectors. However, the increasing reliance on IoT devices also brings forth a significant challenge in terms of cybersecurity. As the number of connected devices continues to grow, so does the potential for cyber threats and attacks. Consequently, the importance of IoT security in cybersecurity technologies has become a critical concern for businesses, governments, and individuals alike.

One of the primary reasons for the growing importance of IoT security is the sheer scale of the IoT ecosystem. According to recent estimates, there will be more than 75 billion connected devices worldwide by 2025. This exponential growth in the number of IoT devices creates a larger attack surface for cybercriminals, making it easier for them to exploit vulnerabilities and gain unauthorized access to sensitive data. In fact, a study by the Ponemon Institute found that 80% of IoT applications are not tested for vulnerabilities, making them prime targets for cyberattacks.

Moreover, the nature of IoT devices makes them particularly susceptible to cyber threats. Many IoT devices are designed with convenience and cost-effectiveness in mind, often at the expense of security features. For instance, some devices may lack proper encryption or authentication mechanisms, making it easier for hackers to intercept data or take control of the device. Additionally, the lifespan of IoT devices tends to be longer than that of traditional IT hardware, meaning that they may continue to operate with outdated software and security patches, further increasing their vulnerability to cyberattacks.

The consequences of IoT security breaches can be severe, not only in terms of financial losses but also in terms of safety and privacy. In 2016, the Mirai botnet attack demonstrated the potential damage that can be caused by exploiting IoT devices. The…

Source…