Alarming Trends In Data Theft

The Singapore Cyber Security Agency (CSA) say that  cyber criminals consider data to be the most valued currency in cyberspace and will try even harder to breach electronic databases.

Their current annual review of the Singapore Threat Landscape confirm that Singapore contines to be a focus for attackes by 'advanced threat actors', although fewer cases of more common threats were detected in the past year.  The CSA pick out several alarming trends in the pattern of criminality.

Data Theft 
As private information and data become very valued products of cyberspace many cyber security organisations believe that cyber criminals will try even harder to breach electronic databases. Organisations that store large amounts of private and personal information will be the biggest targets.

The hacking breach which affected SingHealth was Singapore's worst cyber-attack to date. The personal data of over 1.5m patients, which included the Prime Minister’s Lee Hsien Loong data was taken by hackers in June 2018. 

Threats to the Global Supply Chain
The supply chains that the general public depend on for goods are increasingly becoming interconnected and automated and unfortunately cyber criminals are often attacking and disrupting them.

This is probably why hackers are stealing data from the companies involved in these supply chains or holding them to ransom. Industries dominated by a few firms are especially vulnerable as problems in one stage of production could lead to a breakdown in the entire chain. 

Attacks on Cloud Databases
An increasing number of databases are being hosted in the cloud, which is where software and systems are designed specifically to be deployed over a network.

This means cyber criminals will try to exploit potential vulnerabilities in cloud infrastructure. 

Smart Buildings and Connected Systems
The advent of Internet of Things devices and connected industrial control systems in buildings and factories might improve and quicken, but it also means they are open to more danger. 

As these buildings and systems become "smarter", the risk of them being attacked to hold their owners to ransom, or exploited to spread malware or conduct distributed denial-of-service attacks, also increases, the CSA said. 

Artificial Intelligence (AI)
AI will be able to enhance the capabilities of security systems in cases such as detecting unusual behaviour and rolling out appropriate responses and mitigation measures in the case of an attack. But the CSA warned that threat actors can also use AI to search for vulnerabilities.

It could also potentially be used to create malicious software that bypasses existing online security measures in an organisation. 

Biometric Data 
As biometric authentication, such as the use of fingerprints or facial scanning, becomes increasingly common, threat actors will shift to target and manipulate biometric data to build virtual identities and gain access to personal information.

Straits Times

You Might Also Read:

Singapore Upgrades Cybersecurity:

 

 

« US Hackers Penetrate Russia's Electric Grid
AI Makes Cyber Attacks More Destructive »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Secure India

Secure India

Secure India provides Forensic Solutions that help Government and Business in dealing with prevention and resolution of Cyber related threats.

ShadowDragon

ShadowDragon

ShadowDragon develops digital tools that simplify the complexities of modern investigations that involve multiple online environments and technologies.

Agesic

Agesic

Agesic is an institution that leads the development of the Digital Government and the Information and Knowledge Society in Uruguay.

Redborder

Redborder

Redborder is an Open Source network visibility, data analytics, and cybersecurity Big Data solution that is scalable up to the needs of enterprise networks and service providers.

Synelixis Solutions

Synelixis Solutions

Synelixis Solutions is a high-tech company founded to provide complete telecommunications, networking, security, control and automation solutions.

Reed

Reed

reed.co.uk is a leading job site in the UK, providing a full online service for anyone looking for a new job.

PAX Momentum

PAX Momentum

PAX Momentum is the Mid-Atlantic’s premier startup accelerator, specializing in cyber, enterprise software, telecom, CleanTech, FinTech, InsureTech, and AI.

CYBRScore

CYBRScore

CYBRScore is a premium, performance-based cyber skills training and assessment provider that quantifies a user’s ability to defend a network.

Vijilan Security

Vijilan Security

Vijilan provides 24/7 SOC services to MSPs/VARs. Our Security Operations Center is global, and our services are exclusive to the Channel.

Mindmajix Technologies

Mindmajix Technologies

Mindmajix is a live and interactive e-learning platform that offers professional online IT training in areas including cyber security.

Alcon Maddox

Alcon Maddox

Alcon Maddox is a niche recruitment and executive search firm specialised in sourcing exceptional Cyber Security sales and commercial leadership talent. Serving clients across the Middle East & Europe

West Midlands Cyber Resilience Centre (WMCRC)

West Midlands Cyber Resilience Centre (WMCRC)

The East Midlands Cyber Resilience Centre supports and helps protect SMEs and supply chain businesses and third sector organisations in the region against cyber crime.

Cyber Protection Group (CPG)

Cyber Protection Group (CPG)

Cyber protection Group specialize in Penetration Testing. We work with enterprise level companies as well as small to medium sized businesses.

Cider Security

Cider Security

Cider Security - It’s time to revolutionize the way Security, Dev and DevOps teams work together to supercharge security at the speed of engineering.

Cipher Net Shield

Cipher Net Shield

Cipher Net Shield specializes in secure E-wallet solutions with a strong focus on blockchain and cybersecurity, prioritizing both transaction security and the recovery of lost capital.

Rapifuzz

Rapifuzz

At Rapifuzz, our goal is to help organizations test and secure their APIs enabling trust, innovation and Seamless Secured Digital Experiences.