News
NETSCOUT Highlights Cyberthreats to Watch Out for in 2023
NETSCOUT has revealed its top security trends to watch out for in 2023. Based on recent data, the company has predicted that geopolitical unrest, the evolution of ransomware, and the growing popularity of Adaptive DDoS, Direct-Path DDoS, and Outbound and Cross-bound DDoS attacks will have a significant impact on the security industry in 2023.
Emad Fahmy, Systems Engineering Manager Middle East at NETSCOUT, explained, “In the world of cybercrime, innovation is a constant. By constantly innovating and adapting, attackers are designing new, more effective attack vectors or doubling down on existing effective methodologies. Although the future is always difficult to predict, one thing is certain, cyber-attacks will not subside. Moreover, when it comes to cyber-attacks, no business sector is off-limits. Cybercriminals target regional businesses of all sizes and in all sectors, whether public or private.”
Geopolitical Unrest
Although distributed denial-of-service (DDoS) attacks have steadily increased over the past 20 years, recent data firmly establishes the reality that network operators need to understand, prepare for, and expect attacks related to politics, religion, and ideology. Nation-state actors often directly target internet infrastructure to take out critical communications, e-commerce, and other vital infrastructure dependent on internet connectivity. This, of course, means targeting internet service provider (ISP) networks to limit internet connectivity.
Further, nation-states typically possess vastly greater resources at their disposal than other malicious actors. Every year, they create new DDoS attack vectors, proving that they are constantly innovating and exploring new, more potent attack methods. As DDoS defenses become more precise and effective, attackers continue to develop new DDoS attack vectors and methodologies to circumvent these defenses. These advanced techniques invariably find their way into the hands of criminal gangs and even individual hackers, who turn them against any entity from whom they can profit.
Ransomware
Ransomware attacks have posed a significant threat to businesses and individuals in recent years and will continue to evolve and become more sophisticated in 2023. One trend that will continue to evolve is the use of ransomware in combination with other attacks, such as supply chain attacks. It is also likely that malicious actors will continue to target specific industries or types of organizations with ransomware attacks, specifically to maximize their profits. For example, hospitals and other healthcare organizations have been particularly vulnerable to ransomware attacks in the past because, with lives at stake, they may be more willing to pay a ransom to regain access to critical systems and data.
Another ransomware trend that will continue in 2023 is the use of triple extortion attacks. These campaigns begin by infiltrating a network and stealing valuable assets, such as trade secrets, source codes, credit cards, authentication credentials, and other personally identifiable information (PII). In phase two, ransomware is planted to encrypt valuable data or even entire storage systems. At this point, cybercriminals will demand a ransom in exchange for decryption keys. If the victim refuses to pay the ransom, perhaps because they could simply restore good backups, the threat actors then threaten to release sensitive data publicly if the ransom is not met.
This form of attack has been around for several years and can add additional pressure on the victim because the potential repercussions of the data being released to the public can be severe. While the first two actions can be invisible to the public, the third phase cannot escape publicity. Finally, a DDoS attack or even the threat of such turns the pressure up to the max. If the ransom is not paid, DDoS can take down an organization’s internet presence, thus exposing the entirety of the security threat and failure to protect valuable assets.
Adaptive DDoS
In an adaptive DDoS attack, adversaries conduct extensive pre-attack reconnaissance to identify specific elements of the service delivery chain to target. They are increasingly employing botnet nodes and reflectors/amplifiers that are closer to the target, a trend recently observed in botnet attacks on Ukraine. This minimizes the number of boundaries that DDoS attack traffic must traverse, often resulting in fewer opportunities to detect and mitigate the attack. The combination of increased available bandwidth and throughput increased populations of abusable devices, and adaptive DDoS attack techniques magnify the threat to network operators. As such, network operators should move from a default posture of DDoS mitigation to a new posture of DDoS suppression.
Direct-Path DDoS Attacks
Direct flooding and application-layer DDoS attacks are becoming more popular as anti-spoofing efforts increase globally, making it more difficult for spoofed packets to travel across the internet. Old techniques have become popular again as this methodology returns from the past, back before reflection/amplification attacks dominated the landscape. Enhanced for the modern network, these attacks now come from much more powerful sources, such as cloud-based infrastructure with massive computing and bandwidth resources. Further, adversaries are compromising hosts much closer to the target, thus avoiding many layers of transit, potential discovery, and mitigation. Because of this, organizations must beware of the enemy within.
Outbound and Cross-bound DDoS Attacks
Those are not the only threats coming from within – DDoS attack traffic is increasingly originating from within the network it is targeting, thus avoiding ingress and transit points. DDoS defenses traditionally have been focused on protecting internet properties and networks by implementing detection and mitigation technologies at points of convergence for inbound network traffic. This approach worked well to protect targeted organizations and networks from inbound DDoS attacks; however, outbound and cross-bound DDoS attacks can be just as devastating and disruptive as inbound attacks. Because of adversary innovation and adaption, defenders must change their way of thinking and, in turn, adapt to the current threat landscape.
News
OPSWAT Expands into Saudi Arabia
The Saudi Arabia cybersecurity market is surging forward, reaching a value of SAR 13.3 billion (US$3.55 billion) towards the start of 2024, making it a fertile ground for advancing the cybersecurity industry which aligns perfectly with OPSWAT’s specialized critical infrastructure protection (CIP) technologies and tailor-made solutions that integrate Operational Technology (OT) and Information Technology (IT) security seamlessly.
OPSWAT, a global leader in CIP solutions with headquarters in Florida, United States, has seen a significant expansion of its presence in the Kingdom of Saudi Arabia, marked by tremendous business and overall economic growth of the country over the past two years. The Kingdom’s Vision 2030 sets certain goals for the sector and as a contributor to the success of the global and Saudi cybersecurity space, OPSWAT has specific commitments to support and be part of the country’s development.
In alignment with Vision 2030, which also focuses on enhancing the resilience and preparedness of critical national infrastructure and cybersecurity education and awareness in the Kingdom. OPSWAT’s expansion in Saudi Arabia is dedicated to protecting the Kingdom’s essential services against an evolving landscape of cyber threats as well as addressing the need for improved educational and technical training.
Sertan Selcuk, OPSWAT Vice President METAP & CIS, emphasized the importance of this strategic expansion, stating, “Safeguarding Saudi Arabia’s critical infrastructure against the rising tide of cyber threats is essential to the nation’s security and economic stability. OPSWAT is dedicated to supporting Saudi Vision 2030 by fortifying the Kingdom’s defences through advanced cybersecurity training and innovative solutions. Our commitment is to ensure that Saudi Arabia’s vital assets remain resilient in the face of evolving cyber challenges.”
OPSWAT has been named the official educational partner for the MENA Information Security Conference 2024, which it is also a gold sponsor of. As part of this broader strategy, OPSWAT Academy, the educational arm of OPSWAT, will offer complimentary CIP certifications to all event attendees, tailored specifically to the needs of the region’s cybersecurity professionals.
“We are committed to equipping the next generation of cybersecurity professionals with the skills needed to safeguard critical infrastructure. Our partnership with MENA ISC 2024 opens new avenues for participants to access world-class CIP cybersecurity training,” said Irfan Shakeel, VP of OPSWAT Academy. “This initiative is part of OPSWAT’s global SAR 37.5 million (US $10 million) scholarship program, reinforcing our dedication to addressing the growing demand for certified CIP cybersecurity experts.”
Recent reports indicate a significant rise in state-sponsored cyberattacks targeting Saudi Arabia’s critical infrastructure, driven by the nation’s rapid digital transformation. With the average cost of a data breach in the Kingdom reaching approximately SAR 30 million (US $8 million), the need for robust cybersecurity measures and human resources has never been more urgent. OPSWAT’s initiatives directly address these challenges, ensuring that young aspiring Saudis receive world-class training and that the Kingdom’s essential services remain secure.
Channel Talk
Check Point Software Launches New MSSP Portal for Partners
Check Point has unveiled its innovative Portal designed for both managed security service providers (MSSPs) and distributors. This platform significantly simplifies service delivery and enhances the ease of doing business with Check Point. According to Canalys, the global MSSP market is projected to grow by 14.2% annually, driven by increasing cyber threats and the need for specialized security services.
However, MSSPs and channel partners today face a range of challenges—from efficiently scaling their services, managing multiple customers across disparate security solutions, ensuring compliance with evolving industry regulations, to balancing operational costs with profitability. The Check Point MSSP Portal offers a powerful solution to overcome these hurdles, enhancing security and streamlining operations.
Francisco Criado, Check Point’s VP of Global Partner Ecosystem Organization, said, “Our new Portal is here to make life easier for our valued partners, enhancing efficiency and driving business growth. We are deeply committed to our partner ecosystem, and this Portal stands as a testament to our dedication, serving as a powerful ally in the fight against cybersecurity threats.”
At the core of these advancements is a meticulously designed, user-centric Portal that enables effortless onboarding of partners—a process that previously took as long as a week and now takes only two minutes. This efficiency not only saves time but also reduces operational costs for MSSPs. The Portal seamlessly integrates MSSPs into the Check Point Infinity Platform, marking a significant achievement in Check Point’s MSSP program and transforming business operations.
The Check Point MSSP Portal is not just about enhancing operational efficiency; it’s about transforming the way MSSPs engage with technology, manage services, and ultimately, how they meet the evolving security needs of their clients. It features a range of enhancements including:
- Effortless Onboarding: New capabilities empower distributors to onboard MSSPs with the click of a button
- Diverse Security Portfolio: Effortlessly deploy an array of services in minutes, such as endpoint, email, mobile, SASE, and cloud
- Profitability with Minimal Risk: Flexible billing, predictable revenue, no long-term commitments, or upfront investment
News
Panasonic Launches New CCTV Lineup for SMEs and Homes
Panasonic Marketing Middle East & Africa (PMMAF) has announced its latest innovation in CCTV technology for the region. The Japanese manufacturer returns with a completely new series of security cameras that are designed to provide superior image quality, reliability, and advanced features, ensuring optimal performance in diverse applications. Panasonic’s new range of cameras and network video recorders are designed to meet various customer application needs, providing high security, and ensuring safety in homes, shops, and offices.
Panasonic CCTV solutions provide a cutting-edge lineup with unparalleled surveillance capabilities in a climate where safety and security hold utmost importance. Meticulously designed to empower businesses, communities, and individuals, they significantly help safeguard critical assets. The new Panasonic cameras are complemented by Network Video Recorders (NVRs) supporting 8 to 32 channels of IP cameras with PoE inputs. These NVRs are designed to meet diverse security requirements, leveraging advanced system-on-chip (SoC) technology for high-definition recording on each channel.
Furthermore, a mobile application allows users to access connected cameras via the NVR from their mobile phones. This app supports both iOS and Android platforms. “Panasonic security cameras are sophisticated surveillance systems that utilize intelligent algorithms that enhance functionality and effectiveness. Unlike traditional security cameras, which rely solely on motion detection, Panasonic cameras can intelligently analyze video feeds in real-time, identifying and flagging potential threats or suspicious activities. These cameras can distinguish between normal and abnormal behaviour, allowing for more accurate threat detection and minimizing false alarms,” commented John Hardy – Chief Operating Officer, PMMAF.
Panasonic lineup includes dome, pan-tilt-zoom (PTZ) and bullet cameras that suit multiple installation environments like wall, ceiling, indoor, and outdoor enabling the customer to find the best option for his project. Panasonic lineup contains 2MP,4MP & 5MP that match the customer requirements and MEA country regulations. Panasonic cameras are designed to offer high security, ensuring the safety of customers in their homes, shops, and offices. Equipped with smart intelligence, name few features like line crossing, and abandoned or missing objects can be customizable through the Region of Interest (ROI) feature built into the camera enhancing user security and peace of mind. Moreover, the cameras guarantee customer privacy through an advanced encryption algorithm.
Panasonic network video recorders come with an offering from 8 input channels to 32 input channels, ensuring high-definition recording on each channel through advanced SOC techniques. The NVR’s support IP PoE inputs for easy configuration and network infrastructure simplification enables simultaneous playback across all channels, It meets diverse security requirements for homes, shops, and offices, ensuring customer safety.
-
Cyber Security1 week ago
New Pig Butchering Scam Targets Victims, Warns Chainalysis
-
Cyber Security6 days ago
Positive Technologies: 16% of Darkweb Listings Involve Middle Eastern Organisations
-
Cyber Security5 days ago
MENA Region Sees Surge in Managed Security Services Adoption, Says SearchInform
-
Cyber Security6 days ago
Gartner Forecasts Global Information Security Spending to Grow 15% in 2025
-
Expert Speak1 week ago
Telegram’s Privacy Paradox: The Challenges of Balancing Security and Responsibility
-
Cyber Security6 days ago
Skills Gap Exposes Organisations to Risks
-
Cyber Security4 days ago
SANS Institute to Boost Cyber Resilience in Bahrain and Qatar
-
News4 days ago
Panasonic Launches New CCTV Lineup for SMEs and Homes