Checkpoint – 2018 Security Report
Security Report 2018
2017 was a pivotal year that surprised many in the IT security industry. From the resurgence of destructive ransomware, IoT botnets, data breaches and mobile malware to sophisticated multi-vector technologies, it is clear we are witnessing an inflection point and a transition to the fifth generation of cyber attacks.
As the cyber landscape evolves, the World Economic Forum recently placed cyber attacks as one of the top three global risks for 2018. Indeed, we are now seeing threat actors effectively weaponizing ransomware as a
Data breaches took center stage in the past year, with some shocking revelations about major customer data compromises. Furthermore, the size and frequency of such attacks, from Uber to Equifax, shows no sign of slowing.
Security gaps in mobile features such as Bluetooth, as well as mobile app stores, have also meant that many malware variants continue to roam freely. In fact, millions of mobile devices worldwide have been infected by
In addition, the increasing popularity and meteoric rise in value of crypto-currencies took the world by storm and led to a significant increase in the distribution of cryptominers, which quickly became a favorite monetizing
And finally, the leak of alleged CIA cyber tools by hacktivist groups was seen to cast a long shadow over the global information security ecosystem as a whole. From alleged election hacking to critical infrastructure sabotage, more evidence came to light of nation-state-backed technologies being behind some of the largest global cyber attacks.
In this report, we will take a look back over the past year and try to make sense of it. In turn we will realize how the threat landscape, by entering the fifth generation of cyber security, now spans across countries and
|Descarga el informe completo, llenando los datos