More Cyberattacks in the First Half of 2020 Than in All of 2019

A recent study by CrowdStrike found that there were more cyber attacks on CrowdStrike customers in the first six months of this year than in the whole of 2019.  This trend is confirmed by other studies carried out this year.

Between 1 January and 30 January. By June of this year, the Crowdstrike had discovered about 41,000 potential attacks, compared to 35,000 for the whole of last year.  As in other studies on the increase in cyber attacks, the rapid deployment of remote personnel in response to the COWID 19 pandemic is seen as one of the main reasons for the increase in threat activity. Long-distance travel has given employees in many organizations a much larger area of vulnerability, and it seems that the perpetrators of the threat quickly took advantage of this new opportunity.

The study also showed that easy access to piracy tools such as ransomware-as-a-service (RaaS) software also contributed to the increase in activity.  And, as in other studies, they found that the financial motivation of cybercriminals is an increasingly popular factor for attacks: 82% of attacks fall into the category of e-crime (financially motivated crimes), compared to 69% in 2019.

Organisations in the financial, technological and telecommunications sectors were more targeted than organisations in other sectors.  However, the increasing number of attacks on manufacturing companies, which have become the second most common target after technology companies, is worrying.  The study concluded that the critical nature of most manufacturing companies and the value of intellectual property and other data held by manufacturing companies have made the sector an attractive target for financially motivated attackers and high-risk groups against the nation state.

As the number and nature of these threats increases, including attacks on web applications, organizations need to reassess how they manage the security of their applications.  Although many organizations use BDU solutions such as Crowdstrike, it is important to remember that there is a security infrastructure that provides a deep security architecture.  Perhaps it is time to draw attention to the recent completion of SP800-53 by the National Institute of Standards and Technology (NIST), which was only published in the 23rd quarter of 2009. September 2020 has been published.  The new framework standard for security and privacy now requires Runtime Application Self-Protection (RASP) as an additional level of security in the framework.

RASP solutions such as K2 Cyber Security offer significant application protection, including protection of vulnerable applications, with minimal resource consumption and negligible application delay.  The K2 security platform uses deterministic runtime protection to monitor the application and has in-depth knowledge of application management, DNA and execution flows.  By checking the application control threads, the deterministic security relies on the application itself, not on previous attacks, to determine a zero-day attack.  Deterministic security detects complex zero-day attacks and protects applications from the risks listed in the top ten OWASPs, including XSS and SQL injection.

K2 new generation application workload protection meets today’s requirements for runtime safety with a simple and easy to implement solution.  K2’s unique deterministic defense detects new attacks without relying on knowledge of previous attacks, is light and prolongs the time to wait for a running application by less than a millisecond.  To quickly resolve vulnerabilities, K2 also provides detailed telemetry of the attack, including the codemodule and the line number in the attacked code, while integrating with large firewalls to block attackers in real time.

Change the way you protect your applications and check out K2’s web and application security solution.

To find out more about K2, request a demo or a free trial.

Related Tags:

cyber attack statistics by year,cyber crime statistics 2019,cyber attack tomorrow,recent cyber attacks 2019,cost to business of cyber crime,data breach statistics 2018,Where do most cyber attacks come from?It is reported by the Center for Strategic and International Studies (CSIS) that China and Russia are the biggest cyber offenders and have been since 2006. From 2006 to 2018, China was involved in 108 cyber incidents with losses of more than $1 million each. Russia has been responsible for 98 major cyber incidents since 2006 with losses of more than $1 million each. The study named the rest of the world as the third-worst offender, with 67 incidents. Next in the ranking came Iran with 44 incidents, and North Korea with 38. India was listed as guilty of 16 important cyber incidents from 2006 to 2018, while the U.S. was accused of nine.What percentage of malware is distributed by email?Nearly 98% of all cyber attacks rely on some form of social engineering to deliver a payload such as malware. The most popular method of initiating a social engineering attack is through phishing emails. Therefore, threat actors distribute malware via email approximately 92% of the time.,It is reported by the Center for Strategic and International Studies (CSIS) that China and Russia are the biggest cyber offenders and have been since 2006. From 2006 to 2018, China was involved in 108 cyber incidents with losses of more than $1 million each. Russia has been responsible for 98 major cyber incidents since 2006 with losses of more than $1 million each. The study named the rest of the world as the third-worst offender, with 67 incidents. Next in the ranking came Iran with 44 incidents, and North Korea with 38. India was listed as guilty of 16 important cyber incidents from 2006 to 2018, while the U.S. was accused of nine.,Nearly 98% of all cyber attacks rely on some form of social engineering to deliver a payload such as malware. The most popular method of initiating a social engineering attack is through phishing emails. Therefore, threat actors distribute malware via email approximately 92% of the time.