Global Cyber Attacks Up 63% Driven By AI

The number of significant cyber-attacks has grown by more than 50 per cent in the last three years, with artificial intelligence increasingly being used as a cyber security threat, Linklaters has warned.

A new report from the global law firm has revealed that there were 67 significant cyber incidents worldwide in January to October 2018, compared to 41 incidents in 2016. The figures include attacks on government agencies, defence and technology companies, and financial crime with losses over $1m.

Tanguy Van Overstraeten, TMT partner at Linklaters, said: “As the number of cyber incidents continues to rise and cybercriminals become more sophisticated, it’s likely we’ll see new technologies become increasingly vulnerable to exploitation.

“Examples of this could include the potential dual use of artificial intelligence as both a cyber threat as well as a cybersecurity solution and the creation of greater risks due to the increasing collection of data through the internet of things and machine to machine communications.”

North Korea and Iran have both become more active in cyber-crime over the past few years, with nation states pointing the finger at them for multiple attacks around the world.

North Korea are suspected to be behind seven incidents last year, compared to three in 2016, while six incidents were linked to Iran, rising from just one in 2016.

The UK was targeted five times in major cyber-attacks during the first 10 months of 2018, while the US experienced 24 incidents in the same period.

In April last year, a joint US-UK statement was release warning of increasing cyber-attacks against government institutions and internet providers originating from Russian organisations.

Russia was also named by GCHQ in October as the source of a campaign of malicious cyber-attacks against British political institutions, businesses and media. Researchers have discovered that a Chinese cyber espionage group has been using techniques associated with Russian groups when attacking UK companies to avoid attribution.

CityAM

You Might Also Read:

China’s Hackers Have Stolen EU, US & Global Secrets:

 

 

« Google Search Results Spoofed To Create Fake News
Quantum Computing Will Overtake Conventional Computing »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

AusCERT

AusCERT

AusCERT is the premier Computer Emergency Response Team (CERT) in Australia and a leading CERT in the Asia/Pacific region

Titania

Titania

Titania provide network security and compliance software. Find your Network Security gaps before hackers do with our security & compliance tools.

Spirion

Spirion

Spirion offers data discovery, classification, and protection tools for your business's privacy, security, and compliance program to avoid gaps and risks.

Phoenix Contact Cyber Security

Phoenix Contact Cyber Security

Phoenix Contact Cyber Security is a leading manufacturer of network security appliances for use in industrial environments.

CyberWarrior

CyberWarrior

CyberWarrior deliver training and consulting for some of the world’s top brands and also partner with national systems integrators to augment their teams with our expertise.

adaware

adaware

adaware is an award-winning security and privacy software provider, empowering users to connect with confidence.

Quest Software

Quest Software

Simple IT management for a complex world. Whether it’s digital transformation, cloud expansion, security threats or something new, Quest helps you solve complex problems with simple solutions.

Touchstone Security

Touchstone Security

Touchstone Security is a company with a passion for technology, a hyper-focus on cybersecurity, and a special affinity for cloud technology.

AiCULUS

AiCULUS

AiCULUS is a global technology company that specializes in API security and Risk Management products.

Rhino Security Labs

Rhino Security Labs

Rhino Security Labs is a top penetration testing and security assessment firm, with a focus on cloud pentesting, network pentesting, web application pentesting, and phishing.

Binary Security AS

Binary Security AS

Binary Security is a Norwegian information security consultancy company. We are specialists at application security, penetration testing and secure code reviews.

Jamf

Jamf

Jamf is the only Apple Enterprise Management solution of scale that remotely connects, manages and protects Apple users, devices and services.

Secora Consulting

Secora Consulting

Secora Consulting is a professional services company specialising in tailored cybersecurity assessments and cyber advisory services.

inSOC

inSOC

inSOC is an enterprise-grade AI-driven SOCaaS solution detecting breaches 24/7 with vulnerability management built-in. Designed for MSPs and MSSPs.

Securafy

Securafy

At Securafy, we understand how important it is to have the right IT partner by your side. For over 30 years, we’ve helped businesses stay secure, connected, and compliant.

CQURE

CQURE

CQURE is divided into four main cybersecurity excellence areas: CQURE Consulting, CQURE Academy, CQURE Knowledge Sharing and CQURE Cyber Lab.