The Cyberthreat Handbook

The cyber-threat landscape is extremely diversified, and knowing one's enemies can be particularly complex in this world of subterfuge and deception. Thales and Verint have recently released The Cyberthreat Handbook, a report designed to provide insights into the most significant groups of global cyber-attackers.

Thales and Verint experts have worked together to find out more about cyber attackers and the techniques they employ, the purpose being to help organisations in the private and public sectors to better detect and anticipate future attacks. 

The Handbook details the activities of approximately 60 major groups of cyber-attackers throughout the world, discovering that almost half of the groups analysed were state-sponsored, often aiming to steal sensitive data from targets of geopolitical interest. Just over a quarter were named as ideologically-motivated hacktivists, followed by financially-driven cyber-criminals and cyber-terrorists.

The  Handbook also offers a warning  that all the world’s major economic, political and military powers are priority targets of cyber attackers, and that the sectors most targeted are nation states and their defense capabilities, followed by the financial sector, energy and transportation.

It also notes that a growing number of groups of attackers are now focusing on vulnerabilities in the supply chain, and in particular on smaller partners, suppliers and service providers that are used as Trojans to access major targets. Analysts from Thales and Verint have defined four major categories of attackers based on their motives and ultimate objectives. 

  • Out of approximately sixty major groups of attackers analysed, 49% are state-sponsored groups often aiming to steal sensitive data from targets of geo-political interest. 
  •  26% are ideologically motivated hacktivists. 
  •  Cyber-criminals (20%) who are driven by financial gain. 
  •  Cyber-terrorists account for 5% of the groups analysed.

The 12 countries in the world with the highest GDP are all at the top of the list of targets, headed by the United States, Russia, the European Union (particularly the United Kingdom, France and Germany) and China, followed by India, South Korea and Japan.

 “The Thales and Verint teams are immensely proud to release this report as part of its technology and domain expertise cooperation.... Unique in its breadth and depth, it is the culmination of many months of research, investigation and painstaking analysis and correlation of relevant data. As cyber-threats proliferate and evolve, cyber-security clearly has a major role to play, particularly for critical infrastructure providers.” said Marc Darmon, EVP, of Thales secure communications and information systems division.

Elad Sharon, president, Verint Cyber Intelligence Solutions, added: “This report generates unique insights and knowledge into cyber and security experts” and can be used, “to mitigate and foresee cyber-attacks.”

Thales Group:        Infosecurity:       MobileWorld

You Might Also Read:

Top Six Cyber Secure Countries:

The Biggest International Cybercime Offenders:

 

« Happy Days Ahead For 5G Hackers
Protect Your Organisation From Employee Data Theft »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Cognizant

Cognizant

Cognizant offer services and solutions for IT Infrastructure Security, Enterprise Mobility and Internet of Things.

eco

eco

eco, with more than 950 member organizations, is the largest Internet industry association in Europe.

Tymlez Software & Consulting

Tymlez Software & Consulting

Tymlez Software and Consulting is a start-up specialised in blockchain technology for enterprises.

Mend.io

Mend.io

Mend.io (formerly known as WhiteSource) is an application security company built to secure today’s digital world.

FirstPoint Mobile Guard

FirstPoint Mobile Guard

FirstPoint Mobile Guard has developed the market’s most advanced solution for securing cellular devices, including mobile phones and IoT products, by blocking malicious data leakage.

PROOF

PROOF

PROOF is a Brazilian leader in cybersecurity. Our goal is to assist our Customers in managing security efficiently and in tune with business needs.

Maven Technologies

Maven Technologies

Maven Technologies specialize in secure data destruction, electronics recycling, asset management, and highly detailed reporting.

THEC-Incubator

THEC-Incubator

THEC-Incubator program is designed for international and ambitious tech startups in the Netherlands. Areas of focus include Blockchain and Cyber Security.

Network Center Inc (NCI)

Network Center Inc (NCI)

NCI is one of the largest IT solution providers in the Midwest. We specialize in industry specific technology solutions, service, support, and expertise for small to enterprise businesses.

Blumira

Blumira

Blumira provides comprehensive, hybrid cloud security monitoring and reporting for organizations of all sizes, enabling them to detect and respond to cloud security threats quickly and effectively.

Cyware

Cyware

Cyware is the only company building Virtual Cyber Fusion Centers enabling end-to-end threat intelligence automation, sharing, and unprecedented threat response for organizations globally.

Harbor Networks

Harbor Networks

Harbor Networks is a communications systems integrator and managed services provider. We provide business consultation services for voice and data communication technology.

Unified Solutions

Unified Solutions

Unified Solutions provide a full continuum of cyber security services, compliance, and technology solutions.

Blue Bastion

Blue Bastion

Don’t give cybercriminals the chance to find weaknesses in your company’s cyber security system. Defend your institution from all attacks from all directions with Blue Bastion.

Deepware

Deepware

Deepware is an emerging AI research company dedicated to exploring the potential of GenAI in both generation and detection.

RAD Security

RAD Security

RAD Security (formerly KSOC) is a cloud native security company that empowers engineering and security teams to drive innovation so they can focus on growth versus security problems.