Cybercriminals are also changing their tactics as ransomware attacks evolve. According to a recent Moody’s assessment, hackers are increasingly concentrating on high-value targets, such as large organizations, in an effort to obtain larger payments. According to data from ransomware recovery company Coveware, the percentage of victims ready to pay ransoms has decreased from 85% in 2019 to 28% in early 2024, which is a major factor in this change.
Why Big Organizations Are at Risk
Hackers are indirectly infiltrating larger firms by taking advantage of supply chain vulnerabilities. They obtain access to sensitive systems of well-protected businesses by focusing on suppliers or vendors with laxer cybersecurity measures. This approach exposes a developing vulnerability in global supply chains while also expanding the size of possible rewards.
Because they depend on complex networks of suppliers and contractors, key industries including finance, technology, healthcare, and logistics are especially vulnerable. Because their systems store enormous volumes of cash, transactional data, and customer information, financial institutions are easy targets.
The Rise of GenAI-Driven Phishing Attacks
Although phishing attempts are still a common form of cybercrime, the threat level has increased due to the development of generative artificial intelligence (GenAI). By using GenAI capabilities, attackers can create phishing emails that are convincing and highly tailored, imitating real exchanges. An IEEE research conducted in March 2024 found that 60% of subjects were duped by phishing attacks using GenAI.
Phishing attempts are now 95% less expensive and more successful because to this automation. The emergence of AI solutions like ChatGPT coincided with a 58% spike in phishing attacks in 2023, according to cybersecurity firm Zscaler.
Steps to Prevent Cyberattacks
In order to counter this increasing danger, experts advise:
Enhanced Vendor Risk Management: Businesses need to make sure outside contractors follow stringent security guidelines.
Zero-Trust Security Models: This strategy reduces system trust by requiring rigorous user and access point verification.
Continuous Monitoring: Threats can be reduced before they become more serious by proactively identifying questionable activity within networks and systems.
Also read: Viksit Workforce for a Viksit Bharat
Do Follow: The Mainstream formerly known as CIO News LinkedIn Account | The Mainstream formerly known as CIO News Facebook | The Mainstream formerly known as CIO News Youtube | The Mainstream formerly known as CIO News Twitter
About us:
The Mainstream formerly known as CIO News is the premier platform dedicated to delivering the latest news, updates, and insights from the CIO industry. As a trusted source in the technology and IT sector, we provide a comprehensive resource for executives and professionals seeking to stay informed and ahead of the curve. With a focus on cutting-edge developments and trends, The Mainstream formerly known as CIO News serves as your go-to destination for staying abreast of the rapidly evolving landscape of technology and IT. Founded in June 2020, The Mainstream formerly known as CIO News has rapidly evolved with ambitious growth plans to expand globally, targeting markets in the Middle East & Africa, ASEAN, USA, and the UK