Dec 19 2022
Security

Palo Alto Ignite Reveals The Biggest Cybersecurity Threats of 2022

Experts share why ransomware, phishing attacks and software vulnerabilities ranked high

These days, every organization comes up against cybercriminals. Each new device, user or data point expands the attack surface, giving threat actors more opportunities to compromise environments. At Palo Alto Ignite ’22, hosted by Palo Alto Networks, threat intelligence experts recapped the biggest threats of 2022. Ransomware and business email compromise (BEC) were the top two incident types, followed by phishing and software vulnerabilities.

In a December 14 session titled “Understanding the Threat Landscape,” Ryan Olson, vice president of threat intelligence at Unit 42 explained why these threats, particularly ransomware and BEC, are so pervasive. He was joined by Wendi Whitmore, senior vice president at Unit 42, and Sam Rubin, vice president at Unit 42.

Click the banner below to receive exclusive data analytics content when you register as an Insider.

The Most Rampant Threats of 2022

In the past year, 96 percent of CEOs and executives experienced security breaches, according to a global survey conducted by Palo Alto. The speakers detailed the four biggest attack types of 2022 as defined in that survey, ranked by impact.

1. Ransomware

Olson noted that ransomware increased in 2022. Once hybrid work became the new “status quo,” Olson said, “unsecured third-party devices were being used everywhere, and a massive shift to multi-cloud environments left cybersecurity teams scrambling to secure more cyberthreats than ever.”

This shift left organizations more exposed, making it easier for hackers to attempt deployment of enterprise-wide ransomware. Threat actors can spend an average of 28 days in a targeted environment before being detected, according to Unit 42’s 2022 “Incident Response Report.

2. Business Email Compromise BEC

BEC hacks cost companies over 43 billion dollars this year, according to Whitmore. Olson added that Unit 42 tracked at least 19,000 BEC cases in 2022. BEC is “relatively easy to misjudge because it operates under the radar,” Whitmore said.

Essentially, an outside hacker will write an email to a person inside the organization requesting access to the network. The hackers will then get an accounting rep to authorize a fake invoice to transfer payment to them. “Out of all the scams, this one is really embarrassing,” Olson said, and business leaders often are reluctant to talk about it.

96%

The percentage of CEOs that experienced security breaches in the past year

Source: "What's Next in Cyber," a 2022 Global Survey conducted by Palo Alto Networks

3. Phishing

Phishing is very similar to BEC. It is also designed to trick employees into inadvertently giving privileged information to criminals. With employees working on a variety of devices today, hackers are trying distinct strategies on each platform. Here are the three types to watch: 1) Vishing scams which occur via voice email, or VoIP. 2) Smishing scams which occur via SMS text messages and 3) pharming scams when a malicious code is installed on your computer.

4. Software Vulnerabilities

Hackers typically exploit software vulnerabilities in companies that lack multifactor authentication on internet-facing systems, such as corporate webmail, VPN solutions or other remote access solutions.

Nikesh Arora Photo Bio
Digital transformation is only possible when IT leaders free themselves from the legacy security architectures of today and reimagine them for the future — one where the most complex and evasive threats are stopped in real time.”

Nikesh Arora CEO, Palo Alto Networks

How Can IT Leaders Defend Against Cyber Attacks in 2023?

To limit these threats heading into 2023, IT leaders should continue to strengthen network connectivity across devices in hybrid work environments. Executives should also budget appropriately to continue supporting digital transformation. This means allocating funds to protect 5G networks, embrace the Internet of Things, automate more security options to boost productivity and switch to managed services.

Many of these improvements involve modernizing cybersecurity infrastructure. As Palo Alto CEO Nikesh Arora explained in a separate keynote session, “digital transformation is only possible when IT leaders free themselves from the legacy security architectures of today and reimagine them for the future — one where the most complex and evasive threats are stopped in real time.”

Palo Alto Founder and CTO, Nir Zuk said that AI-led security operations centers are essential to achieving this goal. Artificial intelligence and machine learning automate anomaly detection, improve visibility and control, and counter zero-day attacks. Zuk explained in an earlier session on December 13 that “AI can categorize these repeat attacks to identify the problem before it happens. It’s the only way we’re going to break this cycle.”

Keep this page bookmarked for articles from the event, and follow us on Twitter at @BizTechMagazine and the official conference Twitter feed, @PALiveCommunity.

Close

See How Your Peers Are Moving Forward in the Cloud

New research from CDW can help you build on your success and take the next step.