Alarming Trends In Data Theft

The Singapore Cyber Security Agency (CSA) say that  cyber criminals consider data to be the most valued currency in cyberspace and will try even harder to breach electronic databases.

Their current annual review of the Singapore Threat Landscape confirm that Singapore contines to be a focus for attackes by 'advanced threat actors', although fewer cases of more common threats were detected in the past year.  The CSA pick out several alarming trends in the pattern of criminality.

Data Theft 
As private information and data become very valued products of cyberspace many cyber security organisations believe that cyber criminals will try even harder to breach electronic databases. Organisations that store large amounts of private and personal information will be the biggest targets.

The hacking breach which affected SingHealth was Singapore's worst cyber-attack to date. The personal data of over 1.5m patients, which included the Prime Minister’s Lee Hsien Loong data was taken by hackers in June 2018. 

Threats to the Global Supply Chain
The supply chains that the general public depend on for goods are increasingly becoming interconnected and automated and unfortunately cyber criminals are often attacking and disrupting them.

This is probably why hackers are stealing data from the companies involved in these supply chains or holding them to ransom. Industries dominated by a few firms are especially vulnerable as problems in one stage of production could lead to a breakdown in the entire chain. 

Attacks on Cloud Databases
An increasing number of databases are being hosted in the cloud, which is where software and systems are designed specifically to be deployed over a network.

This means cyber criminals will try to exploit potential vulnerabilities in cloud infrastructure. 

Smart Buildings and Connected Systems
The advent of Internet of Things devices and connected industrial control systems in buildings and factories might improve and quicken, but it also means they are open to more danger. 

As these buildings and systems become "smarter", the risk of them being attacked to hold their owners to ransom, or exploited to spread malware or conduct distributed denial-of-service attacks, also increases, the CSA said. 

Artificial Intelligence (AI)
AI will be able to enhance the capabilities of security systems in cases such as detecting unusual behaviour and rolling out appropriate responses and mitigation measures in the case of an attack. But the CSA warned that threat actors can also use AI to search for vulnerabilities.

It could also potentially be used to create malicious software that bypasses existing online security measures in an organisation. 

Biometric Data 
As biometric authentication, such as the use of fingerprints or facial scanning, becomes increasingly common, threat actors will shift to target and manipulate biometric data to build virtual identities and gain access to personal information.

Straits Times

You Might Also Read:

Singapore Upgrades Cybersecurity:

 

 

« US Hackers Penetrate Russia's Electric Grid
AI Makes Cyber Attacks More Destructive »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

Watch this webinar and get a comprehensive roadmap for securely adopting generative AI using Amazon Bedrock, a fully managed service that offers a choice of high-performing foundation models (FMs).

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IOActive

IOActive

IOActive serves as a trusted security advisor to the Global 500 and other progressive enterprises, helping to safeguard their most important assets and improve their overall security posture.

CERT-MU

CERT-MU

CERT-MU is the Mauritian National Computer Security Incident Response Team.

CybSafe

CybSafe

CybSafe is a cloud-based platform focussed on addressing the human component of cyber security - an intelligent approach to awareness training.

APERIO

APERIO

APERIO, the global leader in industrial data integrity, helps its customers drive profitability and sustainability while mitigating risk in their industrial operations.

TOAE Security

TOAE Security

TOAE Security is a trusted cyber security consulting partner helping today's leading organizations protect their most important assets from evolving cyber threats.

CyberSecurityTrainingCourses.com

CyberSecurityTrainingCourses.com

Cyber Security Training Courses is a portal to help candidates find the best courses to progress their career within the IT security industry.

QuillAudits

QuillAudits

QuillAudits offers advanced Ethereum, EOS, TRON smart contract audit, blockchain protocol security and formal verification to ensure your platform’s integrity.

SAFECode

SAFECode

SAFECode is a global industry forum where business leaders and technical experts come together to exchange insights on creating, improving, and promoting effective software security programs.

Synamic Technologies

Synamic Technologies

Synamic Technologies was founded in 2018 as a start-up to automate cyber security processes. Our CISOSCOPE product automates vulnerability management, risk management and compliance.

SecurIT360

SecurIT360

SecurIT360 is a full-service specialized Cyber Security and Compliance consulting firm.

Nomios

Nomios

Nomios develops innovative solutions for your security and network challenges. We design, secure and manage your digital infrastructure.

Trustifi

Trustifi

Trustifi leads the market with the easiest to use and deploy email security products, providing both inbound and outbound email security from a single vendor.

Mutare

Mutare

For three decades, Mutare has been empowering organizations to re-imagine a better way to connect through our transformative voice security, digital voice and text messaging solutions.

Methods

Methods

Methods is the leading digital transformation partner for the UK public sector. We care deeply about making our public services better and have been doing this for over 28 years.

Vultara

Vultara

Vultara provides web-based product security risk management tools for electronics manufacturers.

Automotive Information Sharing & Analysis Center (Auto-ISAC)

Automotive Information Sharing & Analysis Center (Auto-ISAC)

Auto-ISAC provides a forum for companies to analyze and identify threats sooner and share solutions that enhance vehicle cybersecurity.