Cyber Crime Is The World’s Third Largest Economy

If it were measured as a country, then cybercrime, which inflicted damages totaling $8 trillion globally in 2023, would be the globe’s 3rd largest economy and organised crime hacking activities and cyber attacks will most likely continue to grow the future.  Indeed, cybercrime has grown to become the world’s third-largest economy after the US and China, according to the World Economic Forum (WEF).

In fact, in terms of earnings, cybercrime puts even Tesla, Facebook, Microsoft, Apple, Amazon, and Walmart to shame.  Based on data from Cybersecurity Ventures, it is projected to cost the world $10.5 trillion by 2025.

Ransomware-as-a-service and malware sold on the Dark Web are still what’s driving the growth of cybercrime, according to Security Research Evangelist Roya Gordon at Nozomi Networks speaking to Cyber News. Anyone with the know-how to access the Dark Webs can buy network credentials and ransomware online, which is one of the main drivers of this growth.

Threat actors do not need technical skills to launch sophisticated cyber or ransomware attacks, Gordon. “There are more players in the game because all of these tools are readily available, so you don’t really need to do anything...” 

Cybercriminals are also ready to exploit security gaps resulting from the rapid adoption of the Internet of Things (IoT), or systems of connected devices, across healthcare, education, and business sectors.

In addition to financially motivated criminals and nation-state actors that target critical infrastructure for material gain, Russia’s war in Ukraine has also seen the rise of politically motivated hacktivists, further contributing to the growing economy of cybercrime.

CyberNews:   Cyber Security Ventures:   I-HLS10Guards:   ZAWYA:     Analytics Insight:   KnowB4Essentire:

You Might Also Read: 

Coming Your Way - The Top Cyber Crimes In 2023:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Google Shuts Down Misinformation
Linux Malware Rates Reach Record Highs »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Cynet

Cynet

Cynet simplifies security by providing a rapidly deployed, comprehensive platform for detection, prevention and automated response to advanced threats with near-zero false positives.

Cyber Defense Media Group (CDMG)

Cyber Defense Media Group (CDMG)

CDMG is the leading global media group for all things cyber defense.

Radiant Logic

Radiant Logic

Radiant Logic is a market-leading provider of federated identity solutions based on virtualization, and delivers simple, logical, and standards-based access to all identities within an organization.

Odix

Odix

Odix security software neutralizes file embedded targeted cyber attacks before they enter your organization’s network.

Tigerscheme

Tigerscheme

Tigerscheme is a certification scheme for information security specialists, backed by University standards and covering a wide range of expertise.

Mondo

Mondo

Mondo is the largest national staffing agency specializing exclusively in high-end, niche IT, Tech, and Digital Marketing talent. Areas of expertise include Cybersecurity.

GMV

GMV

GMV is a technological business group offering solutions, services and products in diverse sectors including Intelligent Transportation Systems, Cybersecurity, Telecoms and IT.

DigiSec360

DigiSec360

DigiSec360 is a technology firm focused on the human element of cybersecurity.

Clone Systems

Clone Systems

Clone Systems is an award winning global cloud based managed security as a service provider.

ClearHub

ClearHub

The aim of ClearHub is simple: to give businesses like yours access to the best talent, all screened and technically tested by Clearvision’s expert team.

InfoSec4TC

InfoSec4TC

InfoSec4tc is an online Information Security Courses, Training, and Consultancy provider.

Gen Digital

Gen Digital

At Gen™, our mission is to create technology solutions for people to take full advantage of the digital world, safely, privately, and confidently – so together, we can build a better tomorrow.

Paperclip

Paperclip

Paperclip provides paperless solutions while enabling compliance and security for the exchange of critical content.

Radix Technologies

Radix Technologies

Radix offer end-to-end device management solutions, consolidating all the organization devices, processes and stakeholders into one easy-to-use management platform.

Cloudbrink

Cloudbrink

Cloudbrink is purpose-built to deliver the industry’s highest performance connectivity to remote and hybrid workers, anywhere in the world.

Syteca

Syteca

Syteca is specifically designed to secure organizations against threats caused by insiders. It provides full visibility and control over internal risks.