WNN

Representing Africa Worldwide

5 Cyber Attack Techniques Employed by Hackers in 2022

2 min read
Share This Story

Cyber security experts have identified 5 of the most dangerous cyber attack techniques identified in the first half of the year which gives us a picture of how 2022 – 2023 might look like in the world wide web. Here are the 5 areas cyber security professionals are urged to acquire as many new skills and certifications as possible in preparation for what’s ahead.

The Cloud: Hackers follow where sensitive data and mission-critical workloads head to. Users are urged to learn how best to detect and respond to attacks that hide behind legitimate cloud services to bypass firewalls and proxies.

The MFA Bypass: Old User Accounts that might be assumed to have been deleted could be helping a hacker connect an illegitimate device back into the network so they can bypass multi-factor authentication (MFA) defenses. Monitoring unusual user behaviors and login sources and ensuring all inactive accounts are disabled on AD can help.

The “Ghost Backup” Attack: There’s a type of attack revealed that uses a malicious backup job to replicate sensitive information on a hacker-controlled storage device. Regularly patching and updating your inventories and data retention policies, using encryption, and maintaining tight control of access to the central management console are all effective counters.

Stalkerware: All internet users are “stalkable” to some extent, but some of us are more so than others due to poor security hygiene, it is said. Simple steps like password management, device reboot, and avoiding any temptation to click on a random URL can reduce the risk of personal attack surfacing.

Cyber Warfare: Wars, pandemics, economic crises, and heightened geopolitical tensions are blurring the military and civilian Internet divide. Users are warned to be wary of the risk of hackers adding their skills to a government’s cyber warfare arsenal, and becoming targets of such institution-related attacks.

Leave a Reply

Copyright © All rights reserved. | Powered by UPAM .