Alarming Trends In Data Theft

The Singapore Cyber Security Agency (CSA) say that  cyber criminals consider data to be the most valued currency in cyberspace and will try even harder to breach electronic databases.

Their current annual review of the Singapore Threat Landscape confirm that Singapore contines to be a focus for attackes by 'advanced threat actors', although fewer cases of more common threats were detected in the past year.  The CSA pick out several alarming trends in the pattern of criminality.

Data Theft 
As private information and data become very valued products of cyberspace many cyber security organisations believe that cyber criminals will try even harder to breach electronic databases. Organisations that store large amounts of private and personal information will be the biggest targets.

The hacking breach which affected SingHealth was Singapore's worst cyber-attack to date. The personal data of over 1.5m patients, which included the Prime Minister’s Lee Hsien Loong data was taken by hackers in June 2018. 

Threats to the Global Supply Chain
The supply chains that the general public depend on for goods are increasingly becoming interconnected and automated and unfortunately cyber criminals are often attacking and disrupting them.

This is probably why hackers are stealing data from the companies involved in these supply chains or holding them to ransom. Industries dominated by a few firms are especially vulnerable as problems in one stage of production could lead to a breakdown in the entire chain. 

Attacks on Cloud Databases
An increasing number of databases are being hosted in the cloud, which is where software and systems are designed specifically to be deployed over a network.

This means cyber criminals will try to exploit potential vulnerabilities in cloud infrastructure. 

Smart Buildings and Connected Systems
The advent of Internet of Things devices and connected industrial control systems in buildings and factories might improve and quicken, but it also means they are open to more danger. 

As these buildings and systems become "smarter", the risk of them being attacked to hold their owners to ransom, or exploited to spread malware or conduct distributed denial-of-service attacks, also increases, the CSA said. 

Artificial Intelligence (AI)
AI will be able to enhance the capabilities of security systems in cases such as detecting unusual behaviour and rolling out appropriate responses and mitigation measures in the case of an attack. But the CSA warned that threat actors can also use AI to search for vulnerabilities.

It could also potentially be used to create malicious software that bypasses existing online security measures in an organisation. 

Biometric Data 
As biometric authentication, such as the use of fingerprints or facial scanning, becomes increasingly common, threat actors will shift to target and manipulate biometric data to build virtual identities and gain access to personal information.

Straits Times

You Might Also Read:

Singapore Upgrades Cybersecurity:

 

 

« US Hackers Penetrate Russia's Electric Grid
AI Makes Cyber Attacks More Destructive »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The Networking People (TNP)

The Networking People (TNP)

TNP supplies independent advice allowing large organisations to design, build and operate their own networks independently of the established telecoms companies.

Blue Solutions

Blue Solutions

Blue Solutions is a consultancy-led, accredited software distributor who provides IT solutions and support to small and medium enterprises.

Aptive Consulting

Aptive Consulting

Aptive is a cyber security consultancy providing Penetration Testing and Vulnerability Assessment services.

ODVA

ODVA

ODVA is a global trade and standards development organization whose members comprise the world’s leading industrial automation companies.

Uppsala Security

Uppsala Security

Uppsala Security built the first crowdsourced Threat Intelligence platform known as the Sentinel Protocol, which is powered by blockchain technology.

Brighter AI

Brighter AI

Brighter AI empowers companies to use publicly-recorded camera data for analytics & AI while being compliant with increasing data privacy regulations worldwide.

US Secret Service

US Secret Service

The US Secret Service has a pivotal role in securing the nation’s critical infrastructures, specifically in the areas of cyber, banking and finance.

FraudWatch International

FraudWatch International

FraudWatch has been protecting client brands around the world since 2003, and are the leaders in online brand protection from phishing, malware, social media and mobile apps impersonation.

Open Systems

Open Systems

Open Systems is a Secure Access Service Edge (SASE) pioneer delivering a complete solution to network and security.

Privacera

Privacera

Privacera enables consistent data governance, security, and compliance across all your data services - on-premises and in the cloud - so you can maximize the value of your data.

SecureNation

SecureNation

SecureNation offers a wide variety of cutting-edge technologies and IT services to address almost any of your information security, network security and information assurance needs.

Iron Bow Technologies

Iron Bow Technologies

Iron Bow Technologies is a leading IT solution provider dedicated to successfully transforming technology investments into business capabilities for government, commercial and healthcare clients.

Auvik Networks

Auvik Networks

Auvik is easy-to-use cloud-based networking management and monitoring software - true network visibility and control without the hassle.

General Informatics

General Informatics

General Informatics is a team of technology enthusiasts with one mission: to make our clients even more successful through the best use of technology.

Cybertronium

Cybertronium

Cybertronium is a leader in managing cyber risk. We bring you the latest from the complex, ever-evolving online threat environment with the insights to inspire and the expertise to act.

RankedRight

RankedRight

RankedRight empowers security teams to take immediate action on their most critical risks.

Securily

Securily

Securily offers the ultimate solution for small to medium-sized businesses, blending cutting-edge AI with expert human insight to deliver the world’s easiest and most effective pentesting experience.