Which Sectors Are Top Targets For Cyber Crime?

The latest Global Threat Intelligence Report  from Blackberry highlights an increase in cyber attacks directed at financial institutions, food retailers and healthcare providers, with 60 percent of all attacks targeting these three key industries. The BlackBerry Threat Research and Intelligence team say they stopped more than 1.5 million cyber attacks in the 89 days between December 1, 2022 and February 28, 2023. 

These threats included roughly 1.5 unique malware samples per minute, an increase from the previous reporting period’s average of one unique sample per minute.

BlackBerry’s Global Threat Intelligence Report also notes that ongoing tensions between Western and Eastern countries are fuelling a more fragmented world, which has consequences for the cyber security threat landscape as Western governments call for more cyber defences to protect their citizens and infrastructure. “The initial weeks of 2023 have indicated that this year will remain a difficult time for numerous organisations and individuals across the globe,” said Ismael Valenzuela, Vice President, Threat Research & Intelligence at BlackBerry. 

“With the Russia-Ukraine conflict evolving into a war of attrition, and with cyberattacks a well-documented component of the Russian military playbook, this is a trend that will continue over the coming quarter and likely far beyond.” Valenzuela added.

Highlights from the report include:

Increasing cyberattacks in the healthcare industry:   BlackBerry’s AI-driven prevention-first technology prevented 5,246 unique malware samples. The process of digitising healthcare highlights the need for providers to secure devices and protect patient data from cyber threats. Outdated and insecure infrastructure can create vulnerabilities in healthcare systems, while new technologies may introduce risks if not implemented with appropriate security measures. 

Top 10 countries experiencing cyberattacks in Q1 2023:    The United States is still seeing the highest number of stopped cyberattacks. However, this quarter the landscape has changed, positioning Brazil as the second most targeted country, followed by Canada and Japan. Singapore also appears on the list this quarter. 

Threat actors are growing bolder with commodity malware:    Commodity malware remains a prevalent scourge on the threat landscape this quarter, leveraged by threat actors of all sizes and at all levels of sophistication to target all industries. Often readily available in either a free format or as inexpensive, paid-for Malware-as-a-Service (MaaS) offerings on underground forums and dark markets, they’re powerful in their functionality, such as for use in stealing data and creating backdoors.

Increasing use of AI for attack automation:   Critical infrastructure will always be a target for threat actors, whether financially or politically motived. The use of deepfakes and Artificial Intelligence in the overall threat landscape has gained traction, and ChatGPT is an example of this in action. Like all new technologies, it wasn't long before its uses were being tested for nefarious purposes.

To learn more, download the Global Threat Intelligence Report HERE

You Might Also Read: 

The Top 4 Cyber Threats - Is Your Business Protected?:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« What Is The Difference Between Phishing, Smishing & Vishing? 
Businesses Must Prepare For 90-Day Certificates »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

National Defence Radio Establishment (FRA) - Sweden

National Defence Radio Establishment (FRA) - Sweden

The National Defence Radio Establishment (Försvarets Radioanstalt), is the Swedish national authority for Signals Intelligence, also providing Information assurance services to government authorities.

Untangle

Untangle

Untangle provides network security products designed specifically for the below-enterprise market, safeguarding businesses, home offices, nonprofits, schools and governmental organizations.

FRSecure

FRSecure

FRSecure is a full-service information security management company that protects sensitive, confidential business information from unauthorized access, disclosure, distribution and destruction.

HCL Technologies

HCL Technologies

HCL offer an integrated portfolio of products, solutions and services built around Digital, IoT, Cloud, Automation, Cybersecurity, Analytics, Infrastructure Management and Engineering Services.

Penningtons Manches Cooper

Penningtons Manches Cooper

Penningtons Manches Cooper is a leading UK law firm providing high quality legal advice in areas including Data Protection, Cyber Security and Cyber Crime.

Cybersecurity Collaboration Forum

Cybersecurity Collaboration Forum

The mission of the Cybersecurity Collaboration Forum is to foster information security communication and idea sharing across the C-Suite, enabling leaders to better protect their enterprises.

iZOOlogic

iZOOlogic

iZOOlogic protects hundreds of the world’s leading brands, across banking, finance and government from cybercrime. We provide strong cyber defence solutions to protect client digital assets.

CYSEC SA

CYSEC SA

Cysec is equipped to deliver agile security solutions for the most challenging IT infrastructures around the world.

TwoThreeFour

TwoThreeFour

ThreeTwoFour provide tailored cyber security solutions, delivered by highly-skilled, experienced consultants who respond to the real needs of you and your business.

HiddenLayer

HiddenLayer

HiddenLayer is a provider of security solutions for machine learning algorithms, models and the data that power them.

Oxygen Technologies

Oxygen Technologies

Oxygen Technologies is a business systems strategy and integration company offering a variety of solutions to give our clients ways to work smarter not harder.

Information Security Society of Africa – Nigeria (ISSAN)

Information Security Society of Africa – Nigeria (ISSAN)

The Information Security Society of Africa – Nigeria (ISSAN) is a not-for-profit organization dedicated to the protection of Nigeria’s cyberspace.

Jitterbit

Jitterbit

Jitterbit integrates critical business processes and enables application development to deliver the experiences and insights needed by enterprises of all sizes to accelerate their digital journey.

Xcede

Xcede

Xcede are global technology recruitment specialists. We connect companies with exceptional professionals who empower growth.

Xygeni

Xygeni

Xygeni is a leader in Application Security Posture Management (ASPM). Our advanced technology detects malicious code in real-time to prevent malware infections.

Cyber Security Centre for the Isle of Man (CSC)

Cyber Security Centre for the Isle of Man (CSC)

The Cyber Security Centre for the Isle of Man is responsible for the delivery of the Isle of Man National Cyber Security Strategy.