The Cyberthreat Handbook

The cyber-threat landscape is extremely diversified, and knowing one's enemies can be particularly complex in this world of subterfuge and deception. Thales and Verint have recently released The Cyberthreat Handbook, a report designed to provide insights into the most significant groups of global cyber-attackers.

Thales and Verint experts have worked together to find out more about cyber attackers and the techniques they employ, the purpose being to help organisations in the private and public sectors to better detect and anticipate future attacks. 

The Handbook details the activities of approximately 60 major groups of cyber-attackers throughout the world, discovering that almost half of the groups analysed were state-sponsored, often aiming to steal sensitive data from targets of geopolitical interest. Just over a quarter were named as ideologically-motivated hacktivists, followed by financially-driven cyber-criminals and cyber-terrorists.

The  Handbook also offers a warning  that all the world’s major economic, political and military powers are priority targets of cyber attackers, and that the sectors most targeted are nation states and their defense capabilities, followed by the financial sector, energy and transportation.

It also notes that a growing number of groups of attackers are now focusing on vulnerabilities in the supply chain, and in particular on smaller partners, suppliers and service providers that are used as Trojans to access major targets. Analysts from Thales and Verint have defined four major categories of attackers based on their motives and ultimate objectives. 

  • Out of approximately sixty major groups of attackers analysed, 49% are state-sponsored groups often aiming to steal sensitive data from targets of geo-political interest. 
  •  26% are ideologically motivated hacktivists. 
  •  Cyber-criminals (20%) who are driven by financial gain. 
  •  Cyber-terrorists account for 5% of the groups analysed.

The 12 countries in the world with the highest GDP are all at the top of the list of targets, headed by the United States, Russia, the European Union (particularly the United Kingdom, France and Germany) and China, followed by India, South Korea and Japan.

 “The Thales and Verint teams are immensely proud to release this report as part of its technology and domain expertise cooperation.... Unique in its breadth and depth, it is the culmination of many months of research, investigation and painstaking analysis and correlation of relevant data. As cyber-threats proliferate and evolve, cyber-security clearly has a major role to play, particularly for critical infrastructure providers.” said Marc Darmon, EVP, of Thales secure communications and information systems division.

Elad Sharon, president, Verint Cyber Intelligence Solutions, added: “This report generates unique insights and knowledge into cyber and security experts” and can be used, “to mitigate and foresee cyber-attacks.”

Thales Group:        Infosecurity:       MobileWorld

You Might Also Read:

Top Six Cyber Secure Countries:

The Biggest International Cybercime Offenders:

 

« Happy Days Ahead For 5G Hackers
Protect Your Organisation From Employee Data Theft »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

RIVA Solutions

RIVA Solutions

RIVA provides innovative best practices in IT and management consulting, program support services and emerging technologies.

Fortify Experts

Fortify Experts

Fortify Experts is a search and recruitment firm specializing in Cyber Security.

Cyber Command

Cyber Command

Our Managed IT service allows clients to offload the management of day-to-day computer, server, and networking support to our team of professionals.

Bittium

Bittium

Bittium provides proven information security solutions for mobile devices and portable computers.

Futurex

Futurex

Futurex is a globally recognized provider of enterprise-class data encryption solutions.

Cyber Defense Labs

Cyber Defense Labs

Cyber Defense Labs helps companies identify, mitigate and reduce risk as a trusted, reliable partner for cyber risk management.

Nuspire

Nuspire

Nuspire provide services to protect your network with best-in-class managed detection and response, allowing you to stay focused on managing your business.

H3Secure

H3Secure

H3 Secure focuses on Secure Data Erasure Solutions, Mobile Device Diagnostics and Information Technology Security Consulting.

GM Security Technologies

GM Security Technologies

GM Security Technologies provides leading managed security services of the highest quality to every type of individual and organization in Puerto Rico, Caribbean and Latin America.

Tier One Technology Partners

Tier One Technology Partners

Tier One Technology Partners is an IT managed services provider that focuses on cybersecurity, cloud services, IT consulting, and infrastructure.

Blacksands

Blacksands

Blacksands is a leader in network architecture, identity & services management, threat analysis, industrial IoT architecture, and invisible dynamic networks.

Acora

Acora

Acora provide a range of best-in-class managed services, Microsoft-centric business software, and cloud solutions designed to help mid-market organisations succeed in the digital economy.

Custard Technical Services

Custard Technical Services

Custard provide Network Security for all types of businesses across many industries, helping to keep them safe and secure.

Aptum

Aptum

Aptum is a global hybrid multi-cloud managed service provider delivering complex and high-performance cloud solutions with an integrated secure network.

Next DLP

Next DLP

Next DLP (formerly Jazz Networks) is a leading provider of insider risk and data protection solutions.

OxCyber

OxCyber

OxCyber's mission is to ignite and encourage cybersecurity and technology growth in the Thames Valley through meetings, webinars, in person events, workshops and mentorship programs.