skip to Main Content

RSA security conference identifies 3 of the worst cyber threats

RSA Security Conference Identifies 3 Of The Worst Cyber Threats

Three of the most actual and worst cyber threats have been identified in RSA security conference in San Francisco

Three of worst cyber threats are insecure data being held in the cloud, the malware that install crypto-mining software and infiltration of infrastructure and industrial code. This is what emerged from the RSA security conference in San Francisco, that ended Friday. The event attracted cybersecurity experts from around the world who talked about cyber trends. From the ones related to the cybercrime to the increasing attacks by hackers state sponsored and hactivists, passing through issues like Cambridge Analytica. The picture of IT threats is huge, fluid and diversified. And it’s not linked only in companies, organizations and institutions. The first and primary targets continue to be the single persons, for many aspects.

The insecure data in the cloud are targeted by cybercrime

The first cyber threat identified are the insecure data being held in the cloud. Those are targeted by cybercrime for different reasons. Social engineering and ransoms as first.  Those data in many cases are not protected as should be, as some recent examples confirmed. Last week a security researcher found 48 million records held on an insecure Amazon S3 storage bucket owned by a business data search service called LocalBlox. That company told ZD Net that most – but not all – of the names are fictional and used for testing. So there is a percentage of them that could be easily stolen by cyber criminals. And this case is not isolated.

Cyber criminals continue to spread malware that install crypto-mining software on victims computer and devices. Meanwhile state sponsored hackers attack routers and switches

The second cyber threat is given by the fact that cybercrime continues and increases spreading special “crypto” malware on Internet and social media. The aim is to install install crypto-mining software on victims computers devices. It is valid for single users and companies. The last one, finally, is the infiltration of infrastructure and industrial code. This practise is carried forward especially by state sponsored hackers, and is continuing. Just a week ago USA and UK accused Russia of supporting groups that exploit network infrastructure devices such as routers and switches.

The positive implication: the new and evolving cyber threats are generating new jobs

But those and other evolving cyber threats have also a positive implication. They generate new jobs. In almast all of the medium and big companies there are infosec positions opened. Not only, some of the SME are going cyber, trying to recruit cybersecurity experts. The phenomenon on this last sector at the moment is limited due the high costs, but slowly it’s growing.

Back To Top