The 7 Most UnCommon Cyber Attacks You’ll See In 2023 | LoginRadius Blog
The new year comes with a new bunch of opportunities for businesses embarking on a digital transformation journey. However, the threat vector is broadened with cybercriminals exploring new ways to exploit businesses and customer information.
Cybercriminals are resourceful and innovative creatures who constantly develop new ways to exploit businesses and customer information to reap their benefits. While every organization is aware of the potential threats, they are equally unaware of the uncommon attacks that could severely impact their overall cybersecurity posture…
The Cyber Hut Comment: An interesting blog taking a look at some different, but alas increasingly popular cyber attacks. The article mentions zero day exploits, watering hole attacks, cloud jacking, IoT based distributed denial of service, deepfakes, API attacks and vulnerabilities in 5G security.
Whilst some of these attacks are not new, one or two are worth extra analysis. The cloud jacking issue - where an adversary essentially takes over a target’s cloud resources - will become more of a concern as many organisations leverage a cloud-first approach for services, applications, infrastructure and identity components. In these scenarios an adversary will use the target’s cloud components for malicious use - which could be anything from sending out spam emails, through to stealing storage space or using infrastructure for botnet operations. There are costs involved to the target as well as brand damage and the potential for data ex-filtration as always. What can be done? Strong cloud governance, cloud monitoring and orchestrated identity and access management for all cloud infrastructure and applications would seem a good start.
The IoT angle is another which I can see increasing in 2023 and beyond. Two reasons: mainly the number of devices being bought in both the consumer IoT space as well as areas such as smart cities, manufacturing and healthcare, will see more devices online. Secondly not all devices are being fully integrated into the identity and access management life cycle - so have poor authentication and access control capabilities enabled from the start - as well as having poor data control and encryption principles being implemented.