The report monitored a significant increase in the level of destructive attacks, as the parties executing these attacks worked to employ advanced technologies that enabled them to direct these attacks to target victims and increase the level of complexity of attacks that impede the digital reality of the victims, whether in the form of harming business communications or wasting their time.
Tom Kellerman, head of cybersecurity strategy at VMware, said: “Today we are witnessing a great connection between cities and countries, but cybercriminals are trying to exploit this to develop more complex and more deadly attacks on the targeted victims, in addition to expanding the scope of these attacks. Taking advantage of the conditions of the “Covid-19” pandemic, the great convergence we are witnessing between the physical and digital realities, and the perpetrators of modern cyber attacks can manipulate almost everything, and the fact of the matter is that the parties are the fastest to adopt the latest advanced technologies, whether it is artificial intelligence techniques or learning In fact, they are the perpetrators of these cyberattacks via the dark web or they belong to the intelligence services groups of some nation states.”
However, the suffering of those dealing with these attacks appears to continue, especially in the face of these developments and complex attacks, and they continue to seek knowledge, especially in modern operating environments such as cloud computing, container computing, and business communication applications. The report also highlighted some of the other challenges faced by parties responding to these attacks, including mental health concerns and a high level of business expectations, with nearly 51% indicating that they have experienced significant psychological stress or exhaustion in the past year.
Rick McIlroy, Head of Cyber Security Strategies at VMware, said: “The issue of fatigue is a huge problem for the threat response team, who today face more need to deal with these attacks despite continuing to work largely remotely. This confirms On the urgent need for officials to attract and employ technical teams that possess the necessary skills and competence, whether this requires rotating work responsibilities, or relieving psychological pressure by providing more sick days, or any other initiatives aimed at taking care of work teams and ensuring the development of their personal skills.
The annual edition of the Global Threat Response Report for 2021 also included several references, including:
The relationship between states and cybercrime contributes to increased levels of threats and exploitation of vulnerabilities: 64% of those who have been affected by ransomware attacks in the past year report that they have also encountered cross-programming and collaboration between groups of ransomware attackers. Defenders are also looking for new ways to counter this, and 81% of them said they would be willing to implement an active defense model over the next 12 months.
Using advanced technologies to carry out focused and more lethal attacks: the response teams indicated that the targeted victims today face the most deadly and destructive attacks more than 50% of the time, and the perpetrators of these cybercrimes benefit from the latest available technologies such as timestamp forgery tools, or time-attacks, This was witnessed by nearly 60% of the study participants, and as a result of the shift to remote work, about 32% of the study participants encountered adversaries who tried to exploit business communication platforms to move through the work environment and launch more and more complex cyber attacks.
With the rise in the incidence of cloud computing theft, cloud computing security issues remain a top priority: after pandemic conditions have prompted many to adopt cloud computing technologies, attackers and cybercriminals continue to attempt to exploit these work environments. Nearly half of the respondents (43%) indicated that more than two-thirds of cyber attacks targeted operations through cloud computing, while a third of them (22%) said that it constituted more than half, and for this reason 6 out of ten respondents believe that cloud computing security tools will It is the most important priority for the coming period.