HomeNewsIndia NewsFortinet Threat Report reveals IoT Devices at home are the latest target...

    Fortinet Threat Report reveals IoT Devices at home are the latest target for Cryptojacking

    Fortinet, a global leader in broad, integrated, and automated cybersecurity solutions, announced the findings of its latest Global Threat Landscape Report. The research reveals cyber criminals are becoming smarter and faster in how they leverage exploits to their advantage. They are also maximizing their efforts by targeting an expanding attack surface and by using iterative approaches to software development facilitating the evolution of their attack methodologies. For a detailed view of the findings and some important takeaways for CISOs read the blog. Highlights of the report follow:

    • Virtually No Firm is Immune from Severe Exploits: Analysis focused on critical and high-severity detections demonstrates an alarming trend with 96% of firms experiencing at least one severe exploit. Almost no firm is immune to the evolving attack trends of cyber criminals.
    • Cryptojacking Moves to IoT Devices in the Home: Mining for cryptocurrency continues, cyber criminals added IoT devices, including media devices in the home to their arsenals. They are an especially attractive target because of their rich source of computational horsepower, which can be used for malicious purposes.
    • Botnet Trends Demonstrate the Creativity of Cyber Criminals: Data on botnet trends gives a valuable post-compromise viewpoint of how cybercriminals are maximizing impact with multiple malicious actions. WICKED, a new Mirai botnet variant, added at least three exploits to its arsenal to target unpatched IoT devices.
    • Malware Developers Leverage Agile Development: Malware authors have long relied on polymorphism to evade detection. Recent attack trends show they are turning to agile development practices to make their malware even more difficult to detect and to counter the latest tactics of anti-malware products.
    • Effective Targeting of Vulnerabilities: Adversaries are selective in determining what vulnerabilities they target. With exploits examined from the lens of prevalence and volume of related exploit detections, only 5.7% of known vulnerabilities were exploited in the wild.
    • Education and Government Application Usage: When comparing application count usage across industries, government use of SaaS applications is 108% higher than the mean and is second to education in the total number of applications used daily, 22.5% and 69% higher than the mean, respectively.

    Rajesh Maurya, Regional Vice President, India & SAARC, Fortinet said – “Cyber adversaries are relentless. Increasingly, they are automating their toolsets and creating variations of known exploits. Of late, they are also more precise in their targeting, relying less on blanket attempts to find exploitable victims. Urgently, organizations must pivot their security strategy to address these tactics. Organizations should leverage automated and integrated defenses to address the problems of speed and scale, utilize high-performance behavior-based detection, and rely on AI-informed threat intelligence insights to focus their efforts on patching vulnerabilities that matter.”

    ELE Times Research Desk
    ELE Times Research Deskhttps://www.eletimes.ai
    ELE Times provides a comprehensive global coverage of Electronics, Technology and the Market. In addition to providing in depth articles, ELE Times attracts the industry’s largest, qualified and highly engaged audiences, who appreciate our timely, relevant content and popular formats. ELE Times helps you build awareness, drive traffic, communicate your offerings to right audience, generate leads and sell your products better.

    Related News

    Must Read

    IIIT Hyderabad’s Smart Approach To Sand Mining Enforcement, Incorporating AI in Trucks

    ‘Truck art’ or the hand-painted ‘Horn Ok Please’, ‘Use...

    Applied Materials, CG Power, Lam Research, Larsen & Toubro, and Micron Join the IDTA

    The India Deep Tech Alliance (IDTA) announced that Applied...

    Manufacturing Breakthroughs in Chip Packaging Are Powering AI’s Future

    Courtesy: Lam Research With all the attention being given to...

    Powering the Future: How High-Voltage MLCCs Drive Efficiency in Modern Electronics

    Courtesy: Murata Electronics Power electronics is undergoing a profound transformation....

    Redefining the human experience with intelligent computing

    Courtesy: Qualcomm Enabling the devices, vehicles and machines that define...

    The Forest Listener: Where edge AI meets the wild

    Courtesy: Micron Let’s first discuss the power of enabling. Enabling...

    Solution Suite Concept: Software-Based Refrigerator

    Courtesy: Renesas Imagine a world without cold storage—medicines would spoil,...

    The V2X Revolution: Satellite Integration, Quantum Security, and 5G RedCap Reshape Automotive Connectivity

    Imagine your car negotiating traffic with satellites, quantum-encrypted handshakes,...

    20 Years of EEPROM: Why It Matters, Needed, and Its Future

    ST has been the leading manufacturer of EEPROM for the 20th...

    Modern Cars Will Contain 600 Million Lines of Code by 2027

    Courtesy: Synopsys The 1977 Oldsmobile Toronado was ahead of its...