Which Sectors Are Top Targets For Cyber Crime?

The latest Global Threat Intelligence Report  from Blackberry highlights an increase in cyber attacks directed at financial institutions, food retailers and healthcare providers, with 60 percent of all attacks targeting these three key industries. The BlackBerry Threat Research and Intelligence team say they stopped more than 1.5 million cyber attacks in the 89 days between December 1, 2022 and February 28, 2023. 

These threats included roughly 1.5 unique malware samples per minute, an increase from the previous reporting period’s average of one unique sample per minute.

BlackBerry’s Global Threat Intelligence Report also notes that ongoing tensions between Western and Eastern countries are fuelling a more fragmented world, which has consequences for the cyber security threat landscape as Western governments call for more cyber defences to protect their citizens and infrastructure. “The initial weeks of 2023 have indicated that this year will remain a difficult time for numerous organisations and individuals across the globe,” said Ismael Valenzuela, Vice President, Threat Research & Intelligence at BlackBerry. 

“With the Russia-Ukraine conflict evolving into a war of attrition, and with cyberattacks a well-documented component of the Russian military playbook, this is a trend that will continue over the coming quarter and likely far beyond.” Valenzuela added.

Highlights from the report include:

Increasing cyberattacks in the healthcare industry:   BlackBerry’s AI-driven prevention-first technology prevented 5,246 unique malware samples. The process of digitising healthcare highlights the need for providers to secure devices and protect patient data from cyber threats. Outdated and insecure infrastructure can create vulnerabilities in healthcare systems, while new technologies may introduce risks if not implemented with appropriate security measures. 

Top 10 countries experiencing cyberattacks in Q1 2023:    The United States is still seeing the highest number of stopped cyberattacks. However, this quarter the landscape has changed, positioning Brazil as the second most targeted country, followed by Canada and Japan. Singapore also appears on the list this quarter. 

Threat actors are growing bolder with commodity malware:    Commodity malware remains a prevalent scourge on the threat landscape this quarter, leveraged by threat actors of all sizes and at all levels of sophistication to target all industries. Often readily available in either a free format or as inexpensive, paid-for Malware-as-a-Service (MaaS) offerings on underground forums and dark markets, they’re powerful in their functionality, such as for use in stealing data and creating backdoors.

Increasing use of AI for attack automation:   Critical infrastructure will always be a target for threat actors, whether financially or politically motived. The use of deepfakes and Artificial Intelligence in the overall threat landscape has gained traction, and ChatGPT is an example of this in action. Like all new technologies, it wasn't long before its uses were being tested for nefarious purposes.

To learn more, download the Global Threat Intelligence Report HERE

You Might Also Read: 

The Top 4 Cyber Threats - Is Your Business Protected?:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« What Is The Difference Between Phishing, Smishing & Vishing? 
Businesses Must Prepare For 90-Day Certificates »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DG Technology

DG Technology

DG Technology is a customer-centric technology expert and business consultant that delivers services and products to minimize your information security, compliance, and business risks.

NEC

NEC

NEC offers a complete array of solutions to governments and enterprises to protect themselves from the threats of digital disruption.

Sysmosoft

Sysmosoft

Sysmosoft specializes in providing highly secured telecommunication solutions for mobile devices for companies requiring protected access to sensitive data remotely.

SoftLock

SoftLock

Softlock is a regional leader in Information Security providing solutions, consulting, integration and testing services to protect information assets, identities and supporting infrastructure.

RedShield Security

RedShield Security

RedShield is the world's first web application shielding-with-a-service company.

David Hayes-Export Controls

David Hayes-Export Controls

David Hayes-Export Controls provides assistance to companies affected by export controls or who are considering entering the market but are unsure of the commercial and regulatory implications.

CYBER.ORG

CYBER.ORG

CYBER.ORG's goal is to empower educators as they prepare the next generation to succeed in the cyber workforce of tomorrow.

Industrial Defender

Industrial Defender

Committed to ICS Cybersecurity. Industrial Defender provides a fully automated solution to discover, track and report on assets across your ICS footprint.

Privafy

Privafy

Privafy helps mobile service providers, IoT manufactures , and enterprises redefine the way they protect Data-in-Motion.

Myota

Myota

Myota intelligently equips each file to be resilient and achieve Zero Trust-grade protection. Withstand ransomware and data breach attacks. Reduce data restoration time and effort.

IgmGuru

IgmGuru

Igmguru offers certification online training courses for IT professionals and students. Get certified with high-in-demand job-oriented professional courses.

Olympix

Olympix

Dev-first Web3 security that starts at the source. Olympix is a pioneering DevSecOps tool that puts security in the hands of the developer by proactively securing code from day one.

CyberMaxx

CyberMaxx

At CyberMaxx, our approach to cybersecurity provides end-to-end coverage for our customers – we use offense to fuel defense.

Clarity

Clarity

Clarity is an AI cybersecurity startup that protects against deepfakes and new social engineering and phishing attack vectors accelerated by the rapid adoption of Generative AI.

Aliro Security

Aliro Security

AliroNet is the world’s first entanglement Advanced Secure Network solution.

CHERI Alliance

CHERI Alliance

CHERI Alliance is an industry initiative spearheading the global adoption of the Capability Hardware Enhanced RISC Instructions (CHERI) security technology across the computing industry.