Line 14: |
Line 14: |
| Current trends in cybercrime revolve around how the COVID-19 pandemic has shaped everyday work/home life and highlighted the importance of cyber networks in maintaining [[Cybersecurity and Infrastructure Security Agency|critical infrastructure]]. | | Current trends in cybercrime revolve around how the COVID-19 pandemic has shaped everyday work/home life and highlighted the importance of cyber networks in maintaining [[Cybersecurity and Infrastructure Security Agency|critical infrastructure]]. |
| | | |
− | * [[INTERPOL]]’s ASEAN Desk identified the top cyber threats as:<ref>[https://www.interpol.int/en/News-and-Events/News/2021/INTERPOL-report-charts-top-cyberthreats-in-Southeast-Asia INTERPOL ASEAN Desk]</ref> | + | * '''[[INTERPOL]]’s ASEAN Desk identified the top cyber threats''' as:<ref>[https://www.interpol.int/en/News-and-Events/News/2021/INTERPOL-report-charts-top-cyberthreats-in-Southeast-Asia INTERPOL ASEAN Desk]</ref> |
| # [[Business Email Compromise]], as a high-return investment with low cost and risk; | | # [[Business Email Compromise]], as a high-return investment with low cost and risk; |
| # [[Phishing]], using COVID-19 jargon and misinformation to deceive unsuspecting victims; | | # [[Phishing]], using COVID-19 jargon and misinformation to deceive unsuspecting victims; |
Line 23: |
Line 23: |
| # [[Cryptojacking]], as the value of cryptocurrencies increases. | | # [[Cryptojacking]], as the value of cryptocurrencies increases. |
| | | |
− | * [[Mandiant]]'s M-Trends 2021 Report<ref>[https://content.fireeye.com/m-trends/rpt-m-trends-2021 Executive Summary, 2021 M-Trends Report]</ref> | + | * '''[[Mandiant]]'s M-Trends 2021 Report'''<ref>[https://content.fireeye.com/m-trends/rpt-m-trends-2021 Executive Summary, 2021 M-Trends Report]</ref> |
| # 59% of the security incidents investigated by Mandiant last year were initially detected internally by the organizations themselves (12% better than in 2019). | | # 59% of the security incidents investigated by Mandiant last year were initially detected internally by the organizations themselves (12% better than in 2019). |
| # Ransomware has evolved and now employs various extortion tactics. | | # Ransomware has evolved and now employs various extortion tactics. |
Line 32: |
Line 32: |
| # Threat actors exploited vulnerabilities in the infrastructure supporting work at home. | | # Threat actors exploited vulnerabilities in the infrastructure supporting work at home. |
| | | |
− | * [[Spamhaus]]'s 2021 Q2 Report<ref>[https://www.spamhaus.org/news/article/813/spamhaus-botnet-threat-update-q2-2021 Botnet Update,Spamhaus]</ref> <br/> | + | * '''[[Spamhaus]]'s 2021 Q2 Report'''<ref>[https://www.spamhaus.org/news/article/813/spamhaus-botnet-threat-update-q2-2021 Botnet Update,Spamhaus]</ref> <br/> |
| This report focused on [[Botnet Attacks|botnet]] [[Command and Control]] activity and compared the findings from Q1 with Q2. Key figures: | | This report focused on [[Botnet Attacks|botnet]] [[Command and Control]] activity and compared the findings from Q1 with Q2. Key figures: |
| # A 594% increase of newly registered botnet C&C domains at [[NameSilo]]! This sudden uptick knocked [[Namecheap]] out of first place. | | # A 594% increase of newly registered botnet C&C domains at [[NameSilo]]! This sudden uptick knocked [[Namecheap]] out of first place. |