Ransomware is on the rise, and attackers are massing in never-before-seen numbers, lining up to find victims. Could the new year possibly get any worse? According to FortiGuard Labs, the answer is yes. According to its 2022 predictions, upcoming threats will target an expanding attack surface, meaning that 2022 is “shaping up to be a banner year for cybercriminals. … Attacks will continue to span the entire attack surface, leaving IT teams scrambling to cover every possible avenue of attack.” The author of that report is Derek Manky: chief, security insights & global threat alliances, for FortiGuard Labs. He recently visited the Threatpost podcast to discuss what FortiGuard Labs is seeing, be it more Mirai – the No. 1 botnet listed in the company’s threat landscape report (PDF) for the first half of 2021 – to more Linux-based botnets and more. “We’re going to fully expect to see more of [Mirai],” Manky predicted. “More Linux-based botnets. A lot of these targets, we’re not talking about Windows, but MacOS, we’ve already seen more and more … code written for Linux itself, and that is a majority of the [internet of things, or IoT] space.” Fortinet is also predicting that attacks will continue to span the network, including an increase in attacks targeting Operational Technology (OT) systems, Manky said. It makes sense, he said, given that “That’s where the bigger dollars are.” _Fortinet’s full report, Predictions for 2022: Tomorrow’s Threats Will Target the Expanding Attack…
https://govanguard.com/wp-content/uploads/2018/04/Header_Logo.png 0 0 govanguard https://govanguard.com/wp-content/uploads/2018/04/Header_Logo.png govanguard2021-11-23 16:09:002021-11-23 16:09:00Attackers Will Flock to Crypto Wallets, Linux in 2022: Podcast
Our Standard Office Hours
Monday – Friday: 8:00AM – 5:00PM EDT
Saturday – Sunday: Closed
Where to Find Us
Data Privacy Notice
- – All product names, logos, and brands are property of their respective owners.
- – The use of these names, logos, and brands is for identification purposes only and does not imply endorsement.
- – Content syndication and aggregation of public information is solely for the purpose of identifying information security trends, all syndicated content contains source links to the content creator website. All content is owned by it’s respective content creators.
- – If you are an owner of some content and want it to be removed, please email firstname.lastname@example.org