{"id":28862,"date":"2022-12-15T05:55:00","date_gmt":"2022-12-15T05:55:00","guid":{"rendered":"https:\/\/eodishasamachar.com\/en\/2022\/12\/15\/msps-hybrid-workers-and-connected-cars-face-cyber-threat-onslaught-in-2023\/"},"modified":"2022-12-15T05:55:00","modified_gmt":"2022-12-15T05:55:00","slug":"msps-hybrid-workers-and-connected-cars-face-cyber-threat-onslaught-in-2023","status":"publish","type":"post","link":"https:\/\/eodishasamachar.com\/en\/2022\/12\/15\/msps-hybrid-workers-and-connected-cars-face-cyber-threat-onslaught-in-2023\/","title":{"rendered":"MSPs, Hybrid Workers and Connected Cars Face Cyber-Threat Onslaught in 2023"},"content":{"rendered":"<p> \n<\/p>\n<div lang=\"en\">\n<p>        HONG KONG SAR &#8211;<br \/>\n<a href=\"https:\/\/www.media-outreach.com\/\" rel=\"sponsored\">Media OutReach<\/a> &#8211; 15 December 2022 &#8211;<br \/>\n<a href=\"https:\/\/www.trendmicro.com\/\" rel=\"sponsored\">Trend Micro Incorporated<\/a> (<a href=\"https:\/\/www.google.com\/finance?q=TYO:4704\" rel=\"sponsored\">TYO: 4704<\/a>;<a href=\"https:\/\/www.trendmicro.com\/us\/about-us\/investor-relations\/index.html\" rel=\"sponsored\"> TSE: 4704<\/a>), a global cybersecurity leader, today released<br \/>\n<b>Future\/Tense: Trend Micro Security Predictions for 2023<\/b>. The report warns that threat actors will ramp up attacks targeting security blind spots in the home office, software supply chain and cloud in the coming year<i>.<\/i><\/p>\n<p><b><i>To read a full copy of the report, please visit: <\/i><\/b><a href=\"https:\/\/www.trendmicro.com\/vinfo\/hk\/security\/research-and-analysis\/predictions\/2023\" rel=\"sponsored\"><i>https:\/\/www.trendmicro.com\/vinfo\/<\/i><i>hk<\/i><i>\/security\/research-and-analysis\/predictions\/2023<\/i><\/a><b><i\/><\/b>\n<\/p>\n<p>&#8220;The pandemic might be receding, but remote working is here to stay,&#8221; said Jon Clay, vice president of threat intelligence at Trend Micro. &#8220;That means a renewed threat actor focus on unpatched VPNs, connected SOHO devices and back-end cloud infrastructure in 2023. In response, organizations will need to focus on helping overworked security teams by consolidating attack surface management and detection and response to a single, more cost-effective platform.&#8221;\n<\/p>\n<p>According to the report, VPNs represent a particularly attractive target as a single solution could be exploited to target multiple corporate networks. Home routers will also be singled out as they&#8217;re often left unpatched and unmanaged by central IT.\n<\/p>\n<p>Alongside the threat to hybrid workers, the report anticipates several trends for IT security leaders to watch out for in 2023, including:\n<\/p>\n<ul>\n<li>\n    <b>A growing supply chain threat from managed service providers (MSPs)<\/b>, which will be<b> <\/b>selected because they offer access to a large volume of downstream customers, thereby maximizing the ROI of ransomware, data theft and other attacks<br \/>\n    <b\/>\n  <\/li>\n<li>\n    <b>&#8220;Living off the cloud&#8221; techniques <\/b>may become the norm for groups attacking cloud infrastructure to stay hidden from conventional security tools. An example could be using a victim&#8217;s backup solutions to download stolen data into the attacker&#8217;s storage destination<b\/>\n  <\/li>\n<li>\n    <b>Connected car threats <\/b>such as targeting of the cloud APIs which sit between in-vehicle embedded-SIMs (eSIMs) and back-end application servers. In a worst-case scenario (i.e., Tesla API) attacks could be used to gain access to vehicles. The connected car industry could also be impacted by malware lurking in open-source repositories<b\/>\n  <\/li>\n<li>\n    <b>Ransomware-as-a-service (RaaS) groups may rethink their business <\/b>as the impact of double extortion fades. Some may focus on the cloud, while others could eschew ransomware altogether and try monetizing other forms of extortion like data theft<b\/>\n  <\/li>\n<li>\n    <b>Social engineering will be turbo-charged <\/b>with business email compromise (BEC)-as-a-service offerings and the rise of deepfake-based BEC<b\/>\n  <\/li>\n<\/ul>\n<p>Trend Micro recommends organizations mitigate these emerging threats in 2023 via:<\/p>\n<ul>\n<li>\n    <b>Zero trust strategies <\/b>built on a &#8220;never trust, always verify&#8221; mantra, to minimize damage without sacrificing user productivity\n  <\/li>\n<li>\n    <b>Employee training and awareness raising <\/b>to turn a weak link in the security chain into an effective line of defense\n  <\/li>\n<li>\n    <b>Consolidating onto a single security platform <\/b>for all attack surface monitoring and threat detection and response. This will improve a company&#8217;s ability to catch suspicious activity across their networks, reduce the burden on security teams and keep defenders sharp\n  <\/li>\n<li>\n    <b>Stress testing IT infrastructures<\/b> to ensure attack readiness in different scenarios, especially ones where a perimeter gateway has already been breached\n  <\/li>\n<\/ul>\n<p><b><br \/>\n  <br \/>A software bill of materials (SBOM)<\/b> for every application, to accelerate and enhance vulnerability management\u2014by delivering visibility into code developed in-house, bought from commercial sources, and built from third-party sources<\/p>\n<p><b>Hashtag: <\/b>#TrendMicro<\/p>\n<p>\n            <em>The issuer is solely responsible for the content of this announcement.<\/em>\n        <\/p>\n<\/p><\/div>\n\n<br \/><a href=\"https:\/\/www.media-outreach.com\/news\/hong-kong\/2022\/12\/15\/187001\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>HONG KONG SAR &#8211; Media OutReach &#8211; 15 December 2022 &#8211; Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today released Future\/Tense: Trend Micro Security Predictions for 2023. The report warns that threat actors will ramp up attacks targeting security blind spots in the home office, software supply chain and cloud in &hellip;<\/p>\n","protected":false},"author":1,"featured_media":28520,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[60],"tags":[],"_links":{"self":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/28862"}],"collection":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/comments?post=28862"}],"version-history":[{"count":0,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/28862\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/media\/28520"}],"wp:attachment":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/media?parent=28862"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/categories?post=28862"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/tags?post=28862"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}