Which Sectors Are Top Targets For Cyber Crime?

The latest Global Threat Intelligence Report  from Blackberry highlights an increase in cyber attacks directed at financial institutions, food retailers and healthcare providers, with 60 percent of all attacks targeting these three key industries. The BlackBerry Threat Research and Intelligence team say they stopped more than 1.5 million cyber attacks in the 89 days between December 1, 2022 and February 28, 2023. 

These threats included roughly 1.5 unique malware samples per minute, an increase from the previous reporting period’s average of one unique sample per minute.

BlackBerry’s Global Threat Intelligence Report also notes that ongoing tensions between Western and Eastern countries are fuelling a more fragmented world, which has consequences for the cyber security threat landscape as Western governments call for more cyber defences to protect their citizens and infrastructure. “The initial weeks of 2023 have indicated that this year will remain a difficult time for numerous organisations and individuals across the globe,” said Ismael Valenzuela, Vice President, Threat Research & Intelligence at BlackBerry. 

“With the Russia-Ukraine conflict evolving into a war of attrition, and with cyberattacks a well-documented component of the Russian military playbook, this is a trend that will continue over the coming quarter and likely far beyond.” Valenzuela added.

Highlights from the report include:

Increasing cyberattacks in the healthcare industry:   BlackBerry’s AI-driven prevention-first technology prevented 5,246 unique malware samples. The process of digitising healthcare highlights the need for providers to secure devices and protect patient data from cyber threats. Outdated and insecure infrastructure can create vulnerabilities in healthcare systems, while new technologies may introduce risks if not implemented with appropriate security measures. 

Top 10 countries experiencing cyberattacks in Q1 2023:    The United States is still seeing the highest number of stopped cyberattacks. However, this quarter the landscape has changed, positioning Brazil as the second most targeted country, followed by Canada and Japan. Singapore also appears on the list this quarter. 

Threat actors are growing bolder with commodity malware:    Commodity malware remains a prevalent scourge on the threat landscape this quarter, leveraged by threat actors of all sizes and at all levels of sophistication to target all industries. Often readily available in either a free format or as inexpensive, paid-for Malware-as-a-Service (MaaS) offerings on underground forums and dark markets, they’re powerful in their functionality, such as for use in stealing data and creating backdoors.

Increasing use of AI for attack automation:   Critical infrastructure will always be a target for threat actors, whether financially or politically motived. The use of deepfakes and Artificial Intelligence in the overall threat landscape has gained traction, and ChatGPT is an example of this in action. Like all new technologies, it wasn't long before its uses were being tested for nefarious purposes.

To learn more, download the Global Threat Intelligence Report HERE

You Might Also Read: 

The Top 4 Cyber Threats - Is Your Business Protected?:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« What Is The Difference Between Phishing, Smishing & Vishing? 
Businesses Must Prepare For 90-Day Certificates »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Synology

Synology

Synology provides high-performance, reliable, and secure Network Attached Storage (NAS) products.

Cybercom Group

Cybercom Group

Cybercom offers strategic advice, testing & quality assurance, security solutions, system development, integration, management and operation services.

Cynerio

Cynerio

Cynerio develops cybersecurity protections for medical devices, comparing network behavior with a database of medical workflows.

Valire Software

Valire Software

Valire provide a solution for the automated detection of internal fraud.

Systems Assessment Bureau (SAB)

Systems Assessment Bureau (SAB)

Systems Assessment Bureau is an internationally recognized ISO Certification Body with a unique vision of “Excel together with global standards”.

Cybersecurity Maturity Model Certification Center of Excellence (CMMC COE)

Cybersecurity Maturity Model Certification Center of Excellence (CMMC COE)

CMMC COE is an IT-AAC sponsored public–private partnership that will be the focal point for entities seeking to achieve Cybersecurity Maturity Model Certification.

Center for Information Technology Policy (CITP) - Princeton University

Center for Information Technology Policy (CITP) - Princeton University

The Center for Information Technology Policy at Princeton University is a nexus of expertise in technology, engineering, public policy, and the social sciences.

Communicate Technology

Communicate Technology

Communicate Technology are IT, telecoms and cyber-security specialists, keeping over 500 businesses and 50,000 users connected and secure across the UK.

StickmanCyber

StickmanCyber

At StickmanCyber we are on a mission to create a digital world that is safe for everyone - we are your trusted cybersecurity partner.

Blacksands

Blacksands

Blacksands is a leader in network architecture, identity & services management, threat analysis, industrial IoT architecture, and invisible dynamic networks.

Cyber Tzar

Cyber Tzar

Cyber Tzar is a new approach at dealing with an old problem; assessing and managing risks to your IT estate.

Silent Quadrant

Silent Quadrant

Silent Quadrant delivers incomparable cybersecurity consulting, digital transformation, and risk management within our purpose-driven clients - empowering them to be the most resilient entities.

Xceptional

Xceptional

Xceptional is a multi-award-winning technology services firm that celebrates the unique strengths of people with autism.

Softwerx

Softwerx

Softwerx is the UK’s leading Microsoft cloud security practice. We’ve been helping forward-thinking companies better secure their businesses for nearly twenty years.

Approov

Approov

Approov provides a comprehensive runtime security solution for mobile apps and their APIs, unified across iOS and Android.

Oak9

Oak9

Oak9's Security as Code platform dynamically secures Infrastructure as Code (IaC) and deployed cloud workloads, automatically.