Take a look at the most significant threats from the security world in 2019
2019 continues to be a turbulent year of the global security world. Many new and modern security methods are introduced, but along with it is the continuous progress from malicious agents. Botnets, trojans, RATS or ransomware all contributed to a volatile but memorable 2019. Let's take a look at the most significant threats from the security world in the past year to learn from future experiences.
RDP vulnerability
The flaw of the BlueKeep Remote desktop protocol (RDP), and later DejaBlue, became a nightmare in 2019. They allowed remote attackers to fully exploit and control endpoint devices. targeting. The obsession with a second WannaCry forced Microsoft to immediately release security patches for older systems such as Windows XP and Windows 2000.
Zero-day
Zero-day is one of the indispensable components when it comes to the overall security picture in 2019. For example, in the case of Urgent / 11, this zero-day vulnerability affects 11 execution vulnerabilities. Real-time telemetry code in VxWorks OS - an operating system used in many critical infrastructure devices by government organizations around the world.
CPU gap
After Meltdown and Specter of 2018, CPU-related side-channel vulnerabilities continue to bloom in 2019 with big names like ZombieLoad, Bound Check Bypass Store, Netspectre and NetCAT. experts, the situation in 2020 will certainly remain very difficult, even more serious variants will be recorded.
Ransomware
- What is ransomware?
Undoubtedly, 2019 has been the ransomware's most powerful year since ransomware was first discovered in 2017. Instead of mass targeting, in the past year ransomware strains In general, they have turned their attacks to those who can help them earn more ransom, including schools, hospitals, public services and especially businesses, causing damage of billions of dollars. Some of the prominent ransomware strains to mention in the past year include MegaCortex, Ryuk, LockerGoga, REvil, and PureLocker.
Botnet
Botnets continue to be an important tool in cyber attacks that have occurred throughout the past year. We have seen the return of the infamous Emotet botnet, and especially Echobot, an IoT botnet, that has created a vast mining network with a scale of millions of devices. Botnets will undoubtedly remain a problem in the security world for many years to come.
Attacks on mobile devices
Not as prominent as ransomware or botnets, but attacks on mobile devices have also been a major threat in the past year. Among them are trojans that infect users' smartphones and tablets in order to steal personal information such as Anubis or Gustuff Android . affecting millions of people worldwide.
2020 is forecast to be a difficult year for cybersecurity. Above all, individual users as well as businesses should update their knowledge, stay alert to ensure their own safety.
You should read it
- Security recommendations from the FBI in response to LockerGoga and MegaCortex malware
- Many serious security holes are found in GitLab
- Warning: The number of vulnerabilities in open source software are increasing rapidly
- Detect 2 serious security holes in the Zoom application
- New security vulnerabilities on iOS 12.1 allow access to contacts and phone calls
- Find security holes on every site with Nikto
- IBM developed a new technology to patch security holes
- Detecting a series of vulnerabilities can help hackers disable metal detectors at airports
- Internet Explorer has vulnerabilities, unused users are still hacked
- There are vulnerabilities that allow hackers to bypass the fingerprint security mechanism of Lenovo computers
- Microsoft introduced a tool to fix security holes in IE 9 and 10
- Warning: Jenkins exists a serious security hole that helps hackers gain control of computers of many Vietnamese businesses
Maybe you are interested
Detecting a new ransomware strain that specializes in stealing login information from the Chrome browser
What is extortionware? How is it different from Ransomware?
New ransomware appears attacking Windows operating system
Difference between Cyber Extortion and Ransomware
How to enable ransomware restrictions on Windows
How to configure a firewall to block the WannaCry ransomware attack