The Surge In Ransomware & AI Defence Innovations

Check Point Research, the threat intelligence unit of Check Point Software has released its 2024 Annual Security Report which examines the increasing complexity of cyber threats, with a special focus on the dramatic rise in ransomware incidents and the strategic use of AI in cyber security defences.

The report highlights a 90% increase in publicly extorted victims of ransomware attacks. Such ransomware attacks now account for 10% of all malware detected by Check Point’s sensors.

The Check Point Incident Response Team observed that nearly half of their cases involved ransomware, with the number of publicly shamed victims soaring to approximately 5,000, doubling from the previous year.

Key Findings of the 2024 Security Report include:

  • Ransomware Evolution:   Attackers have refined their strategies, leveraging zero-day vulnerabilities and enhancing Ransomware-as-a-Service (RaaS) with new extortion tactics. High-value targets are increasingly in the crosshairs, demonstrating the need for robust defence mechanisms.
  • Targeting Edge Devices:   The report identifies a growing trend in attacks on edge devices, highlighting the critical need for comprehensive security measures that encompass all network elements.
  • Rise in Hacktivism:   State-supported hacktivism has escalated, with notable increases in cyber activities tied to geopolitical conflicts. The use of destructive wipers for maximum impact underscores the evolving nature of cyber warfare.

“In an era of relentless innovation in cyber crime and accumulating tensions involving nation-state threat actors and hacktivists globally, organisations must adapt.... Investing in stronger defences with robust AI-powered and cloud-delivered cyber security measures, and proactively fostering collaboration, is key to effectively safeguarding against these evolving dangers.” comment Maya Horowitz, VP of Research at Check Point said

The 2024 Security Report serves as a crucial resource for organisations, policymakers, and cybersecurity professionals, offering deep insights into attack trends and providing guidance for strengthening cyber resilience.

Image: Ideogram

You Might Also Read:

Ten Ways To Elevate Public Sector Cyber Security:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Rhysida Ransomware Cracked & Decrypted
AI Targeted Drones Are Not Working »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Covenco

Covenco

Covenco is a data management and IT infrastructure specialist. Working with customers to transform their IT environments, with data protection and security at the forefront of everything we do.

Finnish Information Security Cluster (FISC)

Finnish Information Security Cluster (FISC)

FISC is an organization established by major Finnish information security companies to promote their activities nationally and internationally.

Cyberkov

Cyberkov

Cyberkov services include Pentesting, Vulnerability Assessments, Digital Forensics, Incident Response, Source Code Analysis and Security Training.

Communications Security Establishment (CSE)

Communications Security Establishment (CSE)

CSE is Canada's national cryptologic agency, providing the Government of Canada with IT Security and foreign signals intelligence (SIGINT) services.

Cybersecurity & Infrastructure Security Agency (CISA)

Cybersecurity & Infrastructure Security Agency (CISA)

CISA leads the national effort to defend critical infrastructure against the threats of today and to secure against the evolving risks of tomorrow.

National Authority for Electronic Certification and Cyber Security (AKCESK)

National Authority for Electronic Certification and Cyber Security (AKCESK)

AKCESK ensures security for trusted services, in particular reliability and security in electronic transactions between citizens, businesses and public authorities.

GOVCERT.lu

GOVCERT.lu

GOVCERT.lu is responsible for the treatment of all computer related incidents jeopardising the information systems of the government and defined critical infrastructure operators in Luxembourg.

Cyber Security Jobs

Cyber Security Jobs

Cyber Security Jobs was formed to help job seekers find jobs and recruiters fill cyber security job vacancies.

BeyondTrust

BeyondTrust

BeyondTrust is a leader in Privileged Access Management, offering a seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access.

Acora

Acora

Acora provide a range of best-in-class managed services, Microsoft-centric business software, and cloud solutions designed to help mid-market organisations succeed in the digital economy.

Core to Cloud

Core to Cloud

Core to Cloud provide consultancy and technical support for the planning and implementation of sustainable security strategies.

AFRY

AFRY

AFRY is a world leading engineering company, trusted as a supplier of services and solutions within the industry, energy, and infrastructure sectors as well as for authorities.

Bastazo

Bastazo

Bastazo provides tools for vulnerability and patch management. Focus your cybersecurity operations on vulnerabilities with the highest risk of exploitation.

Pointsharp

Pointsharp

Pointsharp delivers software and services that help organizations secure data, identities, and access in a user-friendly way.

US Insider Risk Management Center of Excellence (US-InRM)

US Insider Risk Management Center of Excellence (US-InRM)

The US-InRM Center of Excellence is a nonprofit organization dedicated to promoting private, public, and academic partnerships to foster knowledge sharing and resources to mitigate insider risk.

CliffGuard Cybersecurity

CliffGuard Cybersecurity

CliffGuard Cybersecurity deliver comprehensive services designed to protect your organization from the ever-evolving landscape of cyber threats.