Alarming Trends In Data Theft

The Singapore Cyber Security Agency (CSA) say that  cyber criminals consider data to be the most valued currency in cyberspace and will try even harder to breach electronic databases.

Their current annual review of the Singapore Threat Landscape confirm that Singapore contines to be a focus for attackes by 'advanced threat actors', although fewer cases of more common threats were detected in the past year.  The CSA pick out several alarming trends in the pattern of criminality.

Data Theft 
As private information and data become very valued products of cyberspace many cyber security organisations believe that cyber criminals will try even harder to breach electronic databases. Organisations that store large amounts of private and personal information will be the biggest targets.

The hacking breach which affected SingHealth was Singapore's worst cyber-attack to date. The personal data of over 1.5m patients, which included the Prime Minister’s Lee Hsien Loong data was taken by hackers in June 2018. 

Threats to the Global Supply Chain
The supply chains that the general public depend on for goods are increasingly becoming interconnected and automated and unfortunately cyber criminals are often attacking and disrupting them.

This is probably why hackers are stealing data from the companies involved in these supply chains or holding them to ransom. Industries dominated by a few firms are especially vulnerable as problems in one stage of production could lead to a breakdown in the entire chain. 

Attacks on Cloud Databases
An increasing number of databases are being hosted in the cloud, which is where software and systems are designed specifically to be deployed over a network.

This means cyber criminals will try to exploit potential vulnerabilities in cloud infrastructure. 

Smart Buildings and Connected Systems
The advent of Internet of Things devices and connected industrial control systems in buildings and factories might improve and quicken, but it also means they are open to more danger. 

As these buildings and systems become "smarter", the risk of them being attacked to hold their owners to ransom, or exploited to spread malware or conduct distributed denial-of-service attacks, also increases, the CSA said. 

Artificial Intelligence (AI)
AI will be able to enhance the capabilities of security systems in cases such as detecting unusual behaviour and rolling out appropriate responses and mitigation measures in the case of an attack. But the CSA warned that threat actors can also use AI to search for vulnerabilities.

It could also potentially be used to create malicious software that bypasses existing online security measures in an organisation. 

Biometric Data 
As biometric authentication, such as the use of fingerprints or facial scanning, becomes increasingly common, threat actors will shift to target and manipulate biometric data to build virtual identities and gain access to personal information.

Straits Times

You Might Also Read:

Singapore Upgrades Cybersecurity:

 

 

« US Hackers Penetrate Russia's Electric Grid
AI Makes Cyber Attacks More Destructive »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XBOSoft

XBOSoft

XBOSoft is a software QA and testing company. We cover the entire QA and testing life cycle including software and application security.

Cambridge Intelligence

Cambridge Intelligence

Cambridge Intelligence are experts in network visualization and finding hidden trends in complex connected data. Applications include cybersecurity.

Trinexia

Trinexia

Trinexia (formerly Credence Security) is a specialty Value-added Distributor of Cyber Security, Digital Forensics, Security Awareness, Data Security & Governance solutions.

Metro Systems

Metro Systems

Metro Systems offer fully integrated IT solutions & services covering Digital Transformation, Digital Infrastructure, Cyber Security and Training.

BI.ZONE

BI.ZONE

BI.ZONE creates high-tech products and solutions to protect IT infrastructures and applications, and provides services from cyber intelligence and proactive defence to cybercrime investigation.

Private Machines

Private Machines

Private Machines develops unique patent-pending technology protects cloud and data center workloads.

Sygnia

Sygnia

Sygnia is a cyber technology and services company, providing high-end consulting and incident response support for organizations worldwide.

Glocomms

Glocomms

Glocomms is a leading specialist recruitment agency for the tech sector, providing permanent, contract, and multi-hire recruitment from our global hubs in San Francisco, New York, London and Berlin.

Turnkey Consulting

Turnkey Consulting

Turnkey Consulting is a leading provider of Integrated Risk Management (IRM), Identity Access Management (IAM), and Cyber and Application Security.

SecureOps

SecureOps

SecureOps is transforming the Managed Security Service Provider industry by providing tailored cybersecurity solutions proven to protect organizations from cyberattacks.

Torch.AI

Torch.AI

Torch.AI’s Nexus™ platform changes the paradigm of data and digital workflows, forever solving core impediments caused by the ever-increasing volume and complexity of information.

Menaya

Menaya

Menaya provide Ethical Hackers for leading companies while also providing cyber security solutions to help major infrastructures protect against cyber crime.

Fairdinkum Consulting

Fairdinkum Consulting

Fairdinkum is a leading full-service IT consulting firm with more than two decades of experience in the industry.

OryxLabs

OryxLabs

OryxLabs provide advanced enterprise digital risk protection solutions. Learn more about how 24x7 continuous assessment, monitoring, and improvement can secure your network.

Applied Connective Technologies

Applied Connective Technologies

Applied Connective is one team for all your technology needs, from IT to phones, cyber security to physical security, audio/video and the infrastructure to support it.

Bastion Security Group

Bastion Security Group

Bastion Security combines the skills, expertise and leadership from Quantum Security, ZX Security, Helix Security and Cassini.