Alarming Trends In Data Theft

The Singapore Cyber Security Agency (CSA) say that  cyber criminals consider data to be the most valued currency in cyberspace and will try even harder to breach electronic databases.

Their current annual review of the Singapore Threat Landscape confirm that Singapore contines to be a focus for attackes by 'advanced threat actors', although fewer cases of more common threats were detected in the past year.  The CSA pick out several alarming trends in the pattern of criminality.

Data Theft 
As private information and data become very valued products of cyberspace many cyber security organisations believe that cyber criminals will try even harder to breach electronic databases. Organisations that store large amounts of private and personal information will be the biggest targets.

The hacking breach which affected SingHealth was Singapore's worst cyber-attack to date. The personal data of over 1.5m patients, which included the Prime Minister’s Lee Hsien Loong data was taken by hackers in June 2018. 

Threats to the Global Supply Chain
The supply chains that the general public depend on for goods are increasingly becoming interconnected and automated and unfortunately cyber criminals are often attacking and disrupting them.

This is probably why hackers are stealing data from the companies involved in these supply chains or holding them to ransom. Industries dominated by a few firms are especially vulnerable as problems in one stage of production could lead to a breakdown in the entire chain. 

Attacks on Cloud Databases
An increasing number of databases are being hosted in the cloud, which is where software and systems are designed specifically to be deployed over a network.

This means cyber criminals will try to exploit potential vulnerabilities in cloud infrastructure. 

Smart Buildings and Connected Systems
The advent of Internet of Things devices and connected industrial control systems in buildings and factories might improve and quicken, but it also means they are open to more danger. 

As these buildings and systems become "smarter", the risk of them being attacked to hold their owners to ransom, or exploited to spread malware or conduct distributed denial-of-service attacks, also increases, the CSA said. 

Artificial Intelligence (AI)
AI will be able to enhance the capabilities of security systems in cases such as detecting unusual behaviour and rolling out appropriate responses and mitigation measures in the case of an attack. But the CSA warned that threat actors can also use AI to search for vulnerabilities.

It could also potentially be used to create malicious software that bypasses existing online security measures in an organisation. 

Biometric Data 
As biometric authentication, such as the use of fingerprints or facial scanning, becomes increasingly common, threat actors will shift to target and manipulate biometric data to build virtual identities and gain access to personal information.

Straits Times

You Might Also Read:

Singapore Upgrades Cybersecurity:

 

 

« US Hackers Penetrate Russia's Electric Grid
AI Makes Cyber Attacks More Destructive »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Wisegate

Wisegate

Wisegate is a community of IT experts providing advisory services on all areas of IT including security.

Wavestone

Wavestone

Wavestone is a strategy and technology consulting company with areas of expertise including digital transformation and cybersecurity.

CyberScout

CyberScout

Cyberscout delivers the latest cybersecurity education, protection and resolutions services. We also provide swift incident response services around the world.

Networkers

Networkers

Networkers is a global recruitment consultancy helping unite job-seekers and hiring companies across the technology industry.

DocAuthority

DocAuthority

DocAuthority automatically discovers and accurately identifies unprotected, sensitive documents, enabling a broad yet business-friendly security policy.

Phew

Phew

Phew are New Zealand cyber security specialists with expertise and experience forged in global financial markets, IT&T, management consulting and SME business management.

Hysolate

Hysolate

Hysolate has transformed the endpoint, making it the secure and productive environment it was meant to be.

Sanderson Recruitment

Sanderson Recruitment

Sanderson is a recruitment company providing expert recruitment services in areas including Cyber & Information Security.

ANSI National Accreditation Board (ANAB)

ANSI National Accreditation Board (ANAB)

ANAB is the largest accreditation body in North America. The directory of members provides details of organisations offering certification services for cybersecurity related standards.

neoEYED

neoEYED

neoEYED helps banks and fintech to detect and prevent frauds using a Behavioral AI that recognizes the users just by looking at “how” they interact with the applications.

CyberEdBoard

CyberEdBoard

CyberEdBoard is a private, peer-to-peer education and networking community focused on cybersecurity, technology, business processes and risk management.

Trava Security

Trava Security

Trava simplifies cyber risk management for business owners and IT professionals. Automated assessments, mitigation advising, and data-driven cyber insurance.

Aite-Novarica Group

Aite-Novarica Group

Aite-Novarica's Cybersecurity practice provides ongoing research and advisory services to chief information security officers focused on protecting their companies’ assets.

Nuance Communications

Nuance Communications

From revolutionizing the doctor-patient relationship to reinventing the way brands connect with their customers, Nuance technology helps organizations push the boundaries of what’s possible.

CYBHORUS

CYBHORUS

CYBHORUS are a team of Italian cyber security experts, specialized in cyber threat defense and strategic and organizational consulting.

Cysmo Cyber Risk

Cysmo Cyber Risk

Cysmo is an innovative cyber risk assessment platform specifically designed for the needs of the German insurance industry.