From Cyber-Covid’19 to Cyberwar’23: a look at the evolving Threat Landscape
The impact and the toll that Covid'19 had on our lives is undeniable. Ranging from vaccine-related cyberespionage operations, designed to steal formulas and accelerate development, to news-driven and Covid-19 themed spearphishing attacks, 2019 and 2020 have been a rough ride. Yet, the most significant and long lasting impact was probably the paradigm change that came with WFH - “Work from home”. Rushing to adjust their networks and remote work strategies, companies opened new vulnerabilities and threat actors were quick to take advantage. In addition to the nation states, professional ransomware groups, hacking collectives such as Lapsus$ or Guacamaya and hacktivists boosted their arsenals and spiced up their operations turning the internet into a battleground. In this presentation, we will cover: • Threat overview and main trends during the Covid-19 years • The rise of professional ransomware groups and hacking collectives • Cyberwar or not? The armed conflicts, role of IoT hacking, key attacks • O
Cybersecurity Congress roomThe impact and the toll that Covid'19 had on our lives is undeniable. Ranging from vaccine-related cyberespionage operations, designed to steal formulas and accelerate development, to news-driven and Covid-19 themed spearphishing attacks, 2019 and 2020 have been a rough ride. Yet, the most significant and long lasting impact was probably the paradigm change that came with WFH - “Work from home”. Rushing to adjust their networks and remote work strategies, companies opened new vulnerabilities and threat actors were quick to take advantage. In addition to the nation states, professional ransomware groups, hacking collectives such as Lapsus$ or Guacamaya and hacktivists boosted their arsenals and spiced up their operations turning the internet into a battleground. In this presentation, we will cover: • Threat overview and main trends during the Covid-19 years • The rise of professional ransomware groups and hacking collectives • Cyberwar or not? The armed conflicts, role of IoT hacking, key attacks • O