However, the growing convergence of technology means that it is unlikely that cybercriminals
will continue to neglect what is a potentially huge platform for their activities,EoACA[yen] Hogan explained.
The use of abbreviated URLs on sites like Twitter makes it even easier for cybercriminals
to mask and direct users to malicious Web sites.
"As reported by Finjan before, cybercriminals
keep on looking for improved methods to distribute their malware and rogueware.
continually up their game, the securities and futures industry in the US recorded, in 2007, a 150% annual increase in the amount of suspicious activity detected on its systems.
More than 2.2 billion stolen account credentials were made available on the cybercriminal
underground over the course of the quarter.
"The more insight defenders have into cybercriminal
behaviour, the more effective technology can be in recognising and stopping suspicious activity," Kellermann said.
Alarmingly, only 16 percent of IT managers consider supply chain a top security risk, exposing an additional weak spot that cybercriminals
will likely add to their repertoire of attack vectors.
"Email fraud continues to provide great returns for cybercriminals
and our latest research confirm that it is not going away," said Emile Abou Saleh, regional director of Middle East and Africa for Proofpoint.
, who goes by the pseudonym "EvaPiks" on several underground cybercrime forums, appears to have been careless enough to have left a trail of digital breadcrumbs that led to Check Point's researchers uncovering his/her online history and persona.
'With highly-online nations like China, India, Indonesia, and the Philippines, the region has more than 600 million active social media users, which can easily catch the attention of cybercriminals
,' he said.
However, as cloud computing has reduced barriers for employees, it has done the same for cybercriminals
. Cloud resources are increasingly easy targets for cybercriminals
, with more than 70 million records stolen or leaked from poorly configured S3 public cloud storage buckets in 2018 alone.
The McAfee team believe that in 2019, underground cybercriminals
will join forces to become sophisticated gangs; artificial intelligence will help cybercriminals
hone their evasion techniques; bad actors will combine multiple attack types to create synergistic super threats; data stored in the cloud will be under serious threat; digital assistants will become accessories to cybercrime in the home; and data-rich social media platforms will continue to be popular attack targets.
In addition to maintaining perimeter defenses, monitoring threat intelligence, and the other daily responsibilities required to stop cybercriminals
from accessing the network via zero-day threats and vulnerabilities, CISOs must now also consider all of the ways cybercriminals
might leverage the tools and behaviors of their employees to gain access to the network.
Cheshire police are supporting a new campaign which aims to combat cybercriminals
and keep innocent shoppers safe online.
However, while e-commerce enjoys rapid growth, global attack trends indicate that the retail support sector continues to be a popular target for cybercriminals
, according to Booz Allen Hamilton For example, the cybercriminal
operation 'MageCart' targets online retailers by creating websites that mimic their victims' websites and inserts malicious code to capture card data.