Loading...

25 Feb 2026 13:00

Mobile & Digital

Cisco Reveals Top Cybersecurity Threats of 2020

Defending Against Critical Threats Report identifies migration to remote working and evolution of ransomware as key contributors towards diverse criminal activity

Cisco has revealed the findings of its Defending Against Critical Threats Report, noting changes in criminal activity during 2020 and new methods of exploitation, arising as a result of the pandemic.

During a year in which transitioning to digital infrastructures became essential for all, Cisco explores the ongoing complexity and evolution of cyber threats, to inform organizations and empower stronger decision-making.

Increased Vulnerabilities with Remote Working

Cisco Umbrella – a cloud-driven Secure Internet Gateway – examined traffic running through its DNS servers, identifying mid-March 2020 as a peak period of increased remote connections. Between the first and last week of March alone, the number of remote workers had effectively doubled.

Cisco Talos noticed a rise in spam emails containing associates with words such as ‘pandemic’ and ‘COVID-19’ in early February 2020. Researchers from the Cisco Umbrella team also showed that on a single day in March 2020, enterprise customers connected to 47,059 domains that contained ‘COVID’ or ‘corona’ in the name. Of these, four percent were blocked as malicious. By late April, the percentage of domains blocked via e-mail filtering peaked as high as 75 percent.

The Evolution of Ransomware and Big-Game Hunting

One of the most prominent trends of 2020 was the widespread adoption of new tactics, techniques, and procedures (TTPs) related to the deployment of ransomware on corporate networks.

Rather than simply activating ransomware on the first successfully compromised system, adversaries are now leveraging systems as an initial access point into the network. They then move laterally throughout the network, gaining access to additional systems and escalating privileges. Ransomware can be activated on all of these systems simultaneously, maximizing the damage inflicted on the organization.

This approach to the attack lifecycle has become known as ‘big-game hunting’ and has gained popularity, with many adversaries actively targeting backup systems, domain controllers, and other business-critical servers during the post-compromise phase of their attacks.

Commenting on the findings, Fady Younes, Cybersecurity Director, Middle East and Africa, Cisco said, “The past year has presented enterprises with a number of new challenges, as they circumnavigated the complex threat landscape in an increasingly digital world. This year, CISOs and IT teams must ensure to implement next-generation firewall measures, advanced malware protection and secure network analytics to know who is connected to the network and for what purpose.”

Targeted Threats for Maximum Impact

Other notable threats included Cisco Talos’ discovery of a new malware campaign in April, known as ‘PoetRAT’. Research showed that the malware was distributed using URLs that mimicked certain government domains, targeting private companies. Talos observed multiple new campaigns from these threat actors over the course of the year, indicating a change in the actor’s capabilities and showing their maturity toward better operational security.

In December 2020, a major supply chain attack was uncovered on a company producing infrastructure management applications. Systems had been compromised earlier in the year and malicious code was introduced into product updates that were made available on their website. A number of organizations that use the software, and had patched with the malicious updates, subsequently reported that they had been breached, including security companies, government agencies, and others.

“Many of the new threats we have identified involve compromising endpoints, which are crucial to secure and maintain in today’s world of remote work. Secure endpoints can protect an organization from major impact after an attack, whether on-premises or remote. Decisionmakers should invest in technologies which integrate prevention, detection, threat hunting, and response capabilities in a single solution for greater visibility and more actionable insights to strengthen security posture,” Younes continued.

NULL
(Visited 8 times, 1 visits today)
peri hokiperihokiduta76duta 76ABC1131 - MPO SLOTABC1131 Bandar Slot Togelmix parlay agen slot qrisMPOGALAXYslot thailandAWSBETketajaman analisa melampaui keberuntungan pola mahjong wild deluxe sicbo gates of olympus berbasis siklus entropi duta76meruntuhkan mitos hoki taktik peluang mahjong ways2 pgsoft baccarat starlight princess yang jarang pernah dibagikan duta76membongkar arsitektur peluang mahjong wins3 pragmatic blackjack sweet bonanza teknik kalkulasi rtp live yang terlupakan duta76melampaui batas konvensional analisa pola mahjong ways2 pgsoft roulette wild bounty showdown taktik rekonstruksi siklus sesi duta76filosofi taruhan berbasis nalar mahjong wins3 pragmatic blackjack sabung ayam sv388 taktik probabilitas yang jarang terekspos duta76menyingkap tabir rtp live mahjong wild deluxe sicbo gates of olympus lewat teknik kalkulasi putaran yang terlupakan perihokiketika logika menggantikan spekulasi teknik baca pola mahjong ways2 pgsoft baccarat starlight princess secara holistik perihokiilmu membaca denyut rtp live mahjong wins3 pragmatic blackjack sweet bonanza pendekatan yang diabaikan pemain berpengalaman perihokipeta jalan kemenangan terstruktur mahjong ways2 pgsoft roulette wild west gold strategi non linear tanpa spekulasi perihokiseni membaca momentum tersembunyi mahjong wins3 pragmatic blackjack sabung ayam sv388 analisa taktik lintas permainan presisi perihokiformasi simbol berulang mahjong wins 3 sesi profesionalkalibrasi prediksi multiplier wild bounty showdown 85 jutasinergi kontrol emosi pola sekuensial dragon hatch stabilitas tempomenelusuri jejak rtp live mahjong wild deluxe sicbo gates of olympus lewat prisma kalkulasi taruhan yang terlupakan perihokimembangun kerangka analisa rtp live mahjong ways 2 pgsoft baccarat starlight princess pendekatan matematis yang tidak lazim perihokiketika presisi mengalahkan spekulasi pola mahjong wins 3 pragmatic blackjack sweet bonanza strategi berbasis arus volatilitas perihokimerajut benang frekuensi mahjong ways2 pgsoft roulette wild bounty showdown analisa mendalam yang jarang diperbincangkan perihokiberpikir seperti analis bukan penjudi teknik baca pola mahjong wins 3 pragmatic blackjack sabung ayam sv388 secara holistik perihokiketika nalar mengalahkan takdir pola mahjong wild deluxe sicbo gates of olympus strategi berbasis spektrum peluang duta76menguak gravitasi pola mahjong ways2 pgsoft baccarat starlight princess strategi lintas meja berbasis jejak entropi siklus duta76sirkuit peluang tak terpetakan mahjong wins3 pragmatic blackjack sweet bonanza taktik rekonstruksi momentum berbasis data duta76membangun kerangka taktik rtp live mahjong ways2 pgsoft roulette wild bounty showdown pendekatan matematis yang tidak lazim duta76merancang ekosistem kemenangan mahjong wins3 pragmatic blackjack sabung ayam sv388 taktik berbasis pemetaan peluang terbalikmodel analisis iterasi diskrit mahjong ways 2 konvergensi sistemkeberhasilan strategis indikator balikan akumulasi 27 jutaanalisis struktur peluang dragon tiger probabilitas kartupenentuan arah strategis optimasi fase awal mahjong waysmitigasi risiko fluktuasi tajam perencanaan jangka panjangvalidasi konsistensi ritme ketahanan data performametodologi komprehensif pemetaan volatilitas sesi digital 2026aplikasi indikator korelasi deviasi standar stabilitas algoritmapembaruan data balikan harian konsistensi stabilitas peluangdampak pergerakan putaran mahjong wins alur strategisaws adaptasi pemain mahjong harianaws analisis perubahan visual mahjongaws atur momentum grid mahjongaws heuristik pola mahjong waysaws interpretasi teknis pola mahjongaws mekanisme reel tumbling mahjongaws perilaku pengguna mahjong harianaws strategi navigasi grid mahjongaws tips ritme mahjong tenangaws vektor akselerasi simbol ways2aws algoritma evolusioner mahjong ways3aws geometri pola mahjong iterasiaws kombinasi mahjong starlightaws korelasi pola stabilitas mahjongaws rahasia wild mahjong waysaws scatter rtp mahjong 12jutaaws sinkronisasi simbol grid mahjongaws skema modal mahjong stabilaws strategi transisi mahjong sweetaws target scatter mahjong winse4 strategi berbasis data dan rtp akurat menuju 23 jutae4 strategi bertahan lama dengan manajemen modal terukure4 strategi cerdas membaca mekanisme rtpe4 strategi hitung akurat untuk target puluhan jutae4 strategi jangka panjang mahjong wins 2 dengan mental tangguhe4 strategi konsisten berbasis rtp stabil yang jadi perbincangane4 strategi konsisten mahjong wins 2 terinspirasi mental juara duniae4 strategi konsisten mahjong wins stop spin cepat fokus momentumdekoding algoritma sweet bonanza terbaru pola sederhanaobservasi fenomena popularitas hiburan virtual indonesiatinjauan struktur koordinatif konsistensi performa digitalsintesis interaksi simbol wild dasar mahjong ways 3penemuan algoritma baru rasio berhasil 87 persen terkinieksplorasi konfigurasi adaptif reel mahjong ways 2investigasi pertumbuhan game cloud industri digitaltata kelola modal terarah mahjong wins 3 harmonisasiperencanaan strategis mahjongways pg soft imlek 2026sosialisasi prinsip probabilitas sikap bermain realistis Top