WebsiteGear Logo Log In
New User? Sign Up
About | Contact | FAQ
  Home News Website Related Website Revenue Saturday, January 19, 2019 
Add Press Release News | News Feeds Feeds | Email This News Email


CyberInt Reports for 2019 - Bolder Cyber Attacks to Occur Against Digital B2C Businesses
Wednesday, January 09, 2019

TEL AVIV, Israel, January 9, 2019 /PRNewswire/ --

CyberInt [https://www.cyberint.com ] reports that as more value is transferred through digital channels, the more they become a target for cyber criminals in particular for B2C businesses who engage with their end customers across multiple channels, both their own as well as partner based.

As we move forward to 2019, credit card and payment information theft will continue to rise as more and more attacks go after businesses' digital footprint - digital assets or channels they employ to interact with their customers. While not surprising, if organizations can better address the reasons for that growth, they'll be better prepared.

Here are some of the reasons for the ongoing vulnerabilities:

        
        - Third-party components - Many businesses use third-party components within their
          digital business environment - shopping carts, for example - and cyber criminals
          exploit vulnerabilities within these components to breach security walls.
        - Better organization & sophistication by threat actors - The bolder cyber attackers
          become, the more organized and sophisticated their campaigns in terms of tools,
          tactics, and procedures (TTP) and the greater the magnitude of their attacks or the
          longer it takes to detect and mitigate them.
        - Lack of real-time monitoring and response - Frequency of attacks is increasing; this
          will continue in perpetuity; only real-time monitoring and fast mitigation will be
          able to protect organizations
        - More script-based malware (like in the recent Magecart attacks) instead of executable
          malware - Attackers are now using higher level languages that can easily bypass
          existing protection mechanisms. The malware simply looks like normal code to the
          defense system.
        - Lack of CISO empowerment - The role of the organization's top security executive
          should be much more prominent, with CISOs providing greater business value (i.e.,
          fraud and reputation protection) and assuming greater involvement in activities that
          were once in the CFO's or CMO's purview in terms of fraud, reputation and legal
          affairs.
          For example, the CISO's role in GDPR compliance, implementation, and enforcement
          within the company - ensuring the standard of due care required from organizations to
          protect information - cannot be overstated.
        - More legitimate infrastructure being used as platforms for attacks - More and more
          attackers use legitimate addresses and domains that are harder to detect and harder to
          block - advanced techniques that obscure attackers' bad behavior and cover up their
          tracks.
          For example, a known streaming service or social media platform uses command and
          control to take a "safe" URL and transform it into a page phishing for credit card
          data.

Getting around this problem requires more targeted threat intelligence and more sophisticated detection and response platforms and, if need be, outsourced, cyber expert-based managed services.

In short, 2019 will see more sophisticated threat actors, more intensified attacks and, yes, more advanced security technology that will, in turn, require greater skills and capabilities.

About CyberInt

CyberInt [https://www.cyberint.com ] eliminates potential threats before they become crises by looking at all online activities and digital assets from an attacker's perspective and provides managed detection and response services to customers worldwide. Leveraging Argos[TM] real-time digital risk protection platform with a global cyber expert analyst team, as well as managed SOC, managed EDR, threat hunting, deep dive investigations, and real-time incident response services, CyberInt provides holistic end-to-end protection to digital businesses in retail, ecommerce, gaming and financial industries. https://www.cyberint.com

A similar version of this content appeared in VMBlog in November 2018.  

For further information, please contact:  Amy Kenigsberg K2 Global Communications amy@k2-gc.com +972-9-794-1681 (+2 GMT) +1-913-440-4072 (+7 ET)

SOURCE CyberInt



Email This News Email | Submit To Slashdot Slashdot | Submit To Digg.com Digg | Submit To del.icio.us Del.icio.us | News Feeds Feeds

RELATED NEWS ARTICLES
Nav 'Touchdown for Love' Personalized Romance Novel for Super Bowl Sunday, Football Fanatics and Valentine's Day | Jan 19, 2019
Nav Valley Hope Association investigation reveals potential unauthorized access to patient data | Jan 19, 2019
Nav Financial Mindfulness: Live and Let Go of Debt-Related Stress by Timberline Financial | Jan 18, 2019
Nav Redis Labs is Recognized as a January 2019 Gartner Peer Insights Customers' Choice for Operational Database Management Systems | Jan 18, 2019
Nav 2019 State of the Woodworking Industry Survey Now Available - Wide-ranging Report Includes Tools, Equipment and Brand Implications | Jan 17, 2019
Nav Finalists Announced in 13th Annual Stevie Awards for Sales & Customer Service | Jan 17, 2019
Nav Guangxi, China: Eradicating poverty through embroidery | Jan 17, 2019
Nav Globalegrow made its debut in CES 2019 Las Vegas | Jan 16, 2019
Nav Global Corrugated Packaging Market, 2013-2018 & 2023 - Increasing Demand of Cost-Effective and Environment-Friendly Packaging Materials | Jan 16, 2019
Nav Get Your Mojo Back and Reclaim Your Power | Jan 16, 2019
NEWS SEARCH

FEATURED NEWS | POPULAR NEWS
Submit News | View More News View More News