"as part of the 2021 application protection report, f5 labs opined that it was more useful to think of ransomware as a monetization strategy rather than as a form of denial - of - service — an alternative to enriching stolen data for later use in digital fraud. looking at ransomwa…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1486Data Encrypted for Impact
75%
"end up with a duplicate password scenario. for enterprises and large organizations, cloud hsm services should look like the only way to go, but i think that it even makes sense for individual power users. i wish i could say my prediction was farsighted, but i don ’ t think that ’…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1588.002Tool
63%
"the risk that cybercriminals and commodity malware pose. this is primarily due to the “ known - known ” nature of a lot of these malware strains. the result is that we rely heavily on antivirus software when it comes to fraud and commodity malware. well - resourced, determined th…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1588.001Malware
38%
"the risk that cybercriminals and commodity malware pose. this is primarily due to the “ known - known ” nature of a lot of these malware strains. the result is that we rely heavily on antivirus software when it comes to fraud and commodity malware. well - resourced, determined th…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1486Data Encrypted for Impact
33%
". 7 don ’ t even get me started on cyber - influence campaigns on social media. we ’ ve already seen plenty of state - sponsored attacks, like wannacry, that come with a side of fraud. if your company gets hit by state - sponsored ransomware, was it an act of war or an act of cri…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195Supply Chain Compromise
33%
"remi cohen prediction 8 : supply chain compromises will continue to dog us if i had to pick a phrase that exemplified 2021, it might just be supply chain. if your home is like mine, your family is tired of hearing it. stores with empty shelves. shipping containers sitting empty i…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
We asked a diverse group of F5 security experts about cybersecurity in 2022. Here’s what they said. We look at cyber-war, cyber-crime, the cloud, the supply chain, encryption keys, and new ransomware targets.