India ranks fourth among Asian countries for detection percentage which has doubled to 7.34 per cent in Q3 of CY2021 from 3.65 per cent in Q2 of CY2021, according to a report by cybersecurity firm Acronis.

Managed service providers (MSPs) are particularly at risk — having more of their own management tools, such as professional services automation (PSA) or remote monitoring and management (RMM), used against them by cybercriminals, and thus are becoming increasingly vulnerable to supply chain attacks.

Supply-chain attacks on MSPs are particularly devastating, since attackers gain access to both their business and clients — as seen in the SolarWinds breach last year and the Kaseya VSA attack earlier in 2021, one successful attack means crippling hundreds or thousands of SMBs.

The report also shows that during the second half of 2021, only 20 per cent of companies reported not having been attacked — as opposed to 32 per cent last year — indicating that attacks are increasing in frequency across the board.

“The cybercrime industry is a well-oiled machine, using cloud and machine intelligence to scale and automate their operations. While the threat landscape continues to grow, we see that the main attack vectors stay the same — and they still work,” says Candid Wuest, Acronis VP of Cyber Protection Research.

“While the attack surface is growing and 2022 will surely bring us surprises, cyber protection automation remains the only path to greater security, reduced risks, lower costs, and improved efficiency,” he added.

The report said that as cryptocurrencies become more and more popular, there will be more attacks on crypto exchanges and cryptocurrencies owners. For example, the crypto exchange Coinbase has recently disclosed that atleast 6,000 customers had fallen victim to a phishing campaign earlier this year — resulting in funds being stolen from their accounts.

It also highlighted that Apple’s macOS has also been a target for cybercriminals, as Macs’ market share is growing. Some Windows malware has been ported to work on Macs, as well as some specific malware created for utilising macOS vulnerabilities.

Dear Reader,

Business Standard has always strived hard to provide up-to-date information and commentary on developments that are of interest to you and have wider political and economic implications for the country and the world. Your encouragement and constant feedback on how to improve our offering have only made our resolve and commitment to these ideals stronger. Even during these difficult times arising out of Covid-19, we continue to remain committed to keeping you informed and updated with credible news, authoritative views and incisive commentary on topical issues of relevance.

We, however, have a request.

As we battle the economic impact of the pandemic, we need your support even more, so that we can continue to offer you more quality content. Our subscription model has seen an encouraging response from many of you, who have subscribed to our online content. More subscription to our online content can only help us achieve the goals of offering you even better and more relevant content. We believe in free, fair and credible journalism. Your support through more subscriptions can help us practise the journalism to which we are committed.

Support quality journalism and subscribe to Business Standard.

Digital Editor

Source link

Leave a Reply

Your email address will not be published. Required fields are marked *