{"id":16616,"date":"2022-02-08T13:25:09","date_gmt":"2022-02-08T13:25:09","guid":{"rendered":"https:\/\/bulletins.bfconsulting.com\/?p=16616"},"modified":"2022-02-08T13:25:09","modified_gmt":"2022-02-08T13:25:09","slug":"cybersecurity-review-of-2021-and-expected-challenges-for-2022-infographic","status":"publish","type":"post","link":"https:\/\/bulletins.bfconsulting.com\/en\/cybersecurity-review-of-2021-and-expected-challenges-for-2022-infographic\/","title":{"rendered":"Cybersecurity Review of 2021 and Expected Challenges for 2022 (Infographic)"},"content":{"rendered":"<p>Experts from Positive Technologies have identified the main cybersecurity trends from 2021 as well as forecast the most relevant cyber security threats for 2022. Take a look inside this revealing infographic.<\/p>\n<p><a href=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2022\/02\/Infogr_02_en.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-large wp-image-16611\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2022\/02\/Infogr_02_en-1024x363.jpg\" alt=\"\" width=\"618\" height=\"219\" srcset=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2022\/02\/Infogr_02_en-1024x363.jpg 1024w, https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2022\/02\/Infogr_02_en-300x106.jpg 300w, https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2022\/02\/Infogr_02_en-768x272.jpg 768w, https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2022\/02\/Infogr_02_en-1536x544.jpg 1536w, https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2022\/02\/Infogr_02_en-2048x726.jpg 2048w\" sizes=\"(max-width: 618px) 100vw, 618px\" \/><\/a><\/p>\n<p>Main Cybersecurity Trends from 2021:<\/p>\n<ul>\n<li><strong>Rising number of ransomware attacks<\/strong> \u2013 ransomware attacks in 2021 easily outpaced those that took place in 2020. Alarmingly, the attacks themselves were also much improved in 2021.<\/li>\n<li><strong>Vulnerabilities in enterprise services <\/strong>\u2013 vulnerabilities in in RDP systems and gaps in audio and video communication systems gave attackers good targets in 2021. Surprisingly, many of the vulnerabilities identified were found in software designed to provide protection against hackers.<\/li>\n<li><strong>Industrial enterprise attacks<\/strong> \u2013 phishing emails and hacking attacks were the main methods of attack on industrial enterprises in 2021, with the share of hacking attacks increasing over 2020. This indicates the low level of security of industrial organizations, their large number of vulnerabilities and security flaws that exist in both network perimeters and in internal infrastructures.<\/li>\n<li><strong>Surge in online fraud within the banking sector<\/strong> \u2013 attackers have begun to pay less attention to payment cards and ATMs and switched to online fraud (especially credit fraud by taking advantage of online checks that use onboarding\/KYC\/AML technologies). In particular, attackers received loans in other names. The rise of this trend is likely due to financial support provided to businesses and individuals during the pandemic.<\/li>\n<li><strong>A boom in the use (and abuse) of AI technologies<\/strong> \u2013 deepfake technologies (in particular, their ability to be run on nearly any device) have allowed attackers to falsify biometric data.<\/li>\n<\/ul>\n<p>Possible Cybersecurity Trends for 2022:<\/p>\n<ul>\n<li><strong>Rise in attacks on government systems<\/strong> \u2013 the growth in the number of online government services and the amount of data processed in government information systems will likely lead to more attacks on government institutions and their web resources.<\/li>\n<li><strong>Intensified race between researchers and criminals<\/strong> \u2013 attackers are likely to continue hunting for zero-day vulnerabilities. But researchers will also be on the hunt. Which will win: hacks or patches?<\/li>\n<li><strong>Automation to solve the information security expert shortage<\/strong> \u2013 automated information security services will help companies better secure themselves, even with an overall shortage of information security experts.<\/li>\n<li><strong>Increased attacks on active online banking users<\/strong> \u2013 attackers will continue developing tools to compromise banking apps. This includes banking trojans, stealers, RATs for mobile devices and social engineering techniques.<\/li>\n<li><strong>Increased interest among cybercriminals in non-fungible tokens (NFTs)<\/strong> \u2013 the rise of tokenization technologies gives a scope for all kinds of ways for deception and theft.<\/li>\n<\/ul>\n<div class=\"rpbt_shortcode\">\n\n<div id='rpbt-related-gallery-1' class='gallery related-gallery related-galleryid-16616 gallery-columns-3 gallery-size-thumbnail'><figure class='gallery-item' role='group' aria-label='Israel: the global cybersecurity solutions leader'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/israel-the-global-cybersecurity-solutions-leader\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2018\/11\/israel-the-global-cybersecurity-solutions-leader-150x150.png\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-11586\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-11586'>\n\t\t\t\tIsrael: the global cybersecurity solutions leader\n\t\t\t\t<\/figcaption><\/figure><figure class='gallery-item' role='group' aria-label='BFC FinTech Monitor (19th January \u2014 8th February)'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/bfc-fintech-monitor-19th-january-8th-february\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2022\/02\/68a29ddf-c5db-6ed3-d837-69726fa6fb051-150x150.png\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-16622\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-16622'>\n\t\t\t\tBFC FinTech Monitor (19th January \u2014 8th February)\n\t\t\t\t<\/figcaption><\/figure><figure class='gallery-item' role='group' aria-label='5 ways FinTech startups are adapting to the COVID-19 pandemic'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/5-ways-fintech-startups-are-adapting-to-the-covid-19-pandemic\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2020\/05\/fintech1-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-14956\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-14956'>\n\t\t\t\t5 ways FinTech startups are adapting to the COVID-19 pandemic\n\t\t\t\t<\/figcaption><\/figure>\n\t\t<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Experts from Positive Technologies have identified the main cybersecurity trends from 2021 as well as forecast the most relevant cyber security threats for 2022. Take a look inside this revealing infographic. Main Cybersecurity Trends from 2021: Rising number of ransomware attacks \u2013 ransomware attacks in 2021 easily outpaced those that took place in 2020. Alarmingly, &hellip;<\/p>\n","protected":false},"author":12,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,16],"tags":[],"_links":{"self":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/16616"}],"collection":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/comments?post=16616"}],"version-history":[{"count":1,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/16616\/revisions"}],"predecessor-version":[{"id":16617,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/16616\/revisions\/16617"}],"wp:attachment":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/media?parent=16616"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/categories?post=16616"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/tags?post=16616"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}