Loading...

20 Mar 2026 08:17

Mobile & Digital

Cisco Reveals Top Cybersecurity Threats of 2020

Defending Against Critical Threats Report identifies migration to remote working and evolution of ransomware as key contributors towards diverse criminal activity

Cisco has revealed the findings of its Defending Against Critical Threats Report, noting changes in criminal activity during 2020 and new methods of exploitation, arising as a result of the pandemic.

During a year in which transitioning to digital infrastructures became essential for all, Cisco explores the ongoing complexity and evolution of cyber threats, to inform organizations and empower stronger decision-making.

Increased Vulnerabilities with Remote Working

Cisco Umbrella – a cloud-driven Secure Internet Gateway – examined traffic running through its DNS servers, identifying mid-March 2020 as a peak period of increased remote connections. Between the first and last week of March alone, the number of remote workers had effectively doubled.

Cisco Talos noticed a rise in spam emails containing associates with words such as ‘pandemic’ and ‘COVID-19’ in early February 2020. Researchers from the Cisco Umbrella team also showed that on a single day in March 2020, enterprise customers connected to 47,059 domains that contained ‘COVID’ or ‘corona’ in the name. Of these, four percent were blocked as malicious. By late April, the percentage of domains blocked via e-mail filtering peaked as high as 75 percent.

The Evolution of Ransomware and Big-Game Hunting

One of the most prominent trends of 2020 was the widespread adoption of new tactics, techniques, and procedures (TTPs) related to the deployment of ransomware on corporate networks.

Rather than simply activating ransomware on the first successfully compromised system, adversaries are now leveraging systems as an initial access point into the network. They then move laterally throughout the network, gaining access to additional systems and escalating privileges. Ransomware can be activated on all of these systems simultaneously, maximizing the damage inflicted on the organization.

This approach to the attack lifecycle has become known as ‘big-game hunting’ and has gained popularity, with many adversaries actively targeting backup systems, domain controllers, and other business-critical servers during the post-compromise phase of their attacks.

Commenting on the findings, Fady Younes, Cybersecurity Director, Middle East and Africa, Cisco said, “The past year has presented enterprises with a number of new challenges, as they circumnavigated the complex threat landscape in an increasingly digital world. This year, CISOs and IT teams must ensure to implement next-generation firewall measures, advanced malware protection and secure network analytics to know who is connected to the network and for what purpose.”

Targeted Threats for Maximum Impact

Other notable threats included Cisco Talos’ discovery of a new malware campaign in April, known as ‘PoetRAT’. Research showed that the malware was distributed using URLs that mimicked certain government domains, targeting private companies. Talos observed multiple new campaigns from these threat actors over the course of the year, indicating a change in the actor’s capabilities and showing their maturity toward better operational security.

In December 2020, a major supply chain attack was uncovered on a company producing infrastructure management applications. Systems had been compromised earlier in the year and malicious code was introduced into product updates that were made available on their website. A number of organizations that use the software, and had patched with the malicious updates, subsequently reported that they had been breached, including security companies, government agencies, and others.

“Many of the new threats we have identified involve compromising endpoints, which are crucial to secure and maintain in today’s world of remote work. Secure endpoints can protect an organization from major impact after an attack, whether on-premises or remote. Decisionmakers should invest in technologies which integrate prevention, detection, threat hunting, and response capabilities in a single solution for greater visibility and more actionable insights to strengthen security posture,” Younes continued.

NULL
(Visited 8 times, 1 visits today)
peri hokiperihokiduta76duta 76ABC1131 - MPO SLOTABC1131 Bandar Slot Togelmix parlay agen slot qrisMPOGALAXYslot thailandAWSBETkincir88ABC1131ABC1131 LOGINhttps://abc1131.hartanzah.com/aws infrastruktur server mahjongways stabilaws tren rtp mahjongways strategiaws atensi pembaca mahjongways statistikaws stratifikasi statistik mahjongways3aws dinamika struktur mahjongways2 observasideskripsi perilaku rise of giza platform digitalnavigasi keberhasilan caishen wins game viralregulasi ritme ganesha fortune sesi digitalkarakteristik fase awal double fortune navigasiimplementasi taktik leprechaun riches 95 persenpeta industri genies wishes analisis algoritmaaws fluktuasi rtp mahjong komunitasaws grid bergerak mahjongways2 observasiaws kombinasi simbol mahjongways panduanaws transisi warna scatter mahjongways2aws variasi hasil mahjong wins3aws fraktal heuristik mahjongways3 dataaws pengalaman scatter mahjongwins3 dinamisaws pengelolaan saldo mahjongways2 terencanaaws struktur simbol scatter mahjongwins3aws unit presisi mahjongwins3 stabilitasaws eksplorasi tren game modernaws fokus emosi mahjongways2 strategiaws manajemen waktu mahjongways2 sesiaws mekanika mahjongways2 sistemik rtpaws visual data mahjongways trenkombinasi strategi dan taktik mahjong wild deluxe dadu sicbo gates of olympus untuk optimalkan rtp live perihokicara cerdas menggunakan strategi pola dan teknik mahjong ways 2 pgsoft baccarat starlight princess perihokianalisa pro pola dan strategi mahjong wins 3 pragmatic blackjack sweet bonanza untuk pemain serius perihokimetode cerdas analisa pola mahjong ways 2 pgsoft roulette dan wild bounty showdown perihokiteknik efektif analisa dan teknik mahjong wins 3 pragmatic blackjack sugar rush sv388 raih peluang terbaik perihokipanduan pro teknik dan pola mahjong wild deluxe dadu sicbo gates of olympus paling mudah jepe duta76analisa pola dan teknik mahjong ways 2 pgsoft baccarat starlight princess optimalkan rtp live duta76kombinasi peluang pola dan teknik mahjong wins 3 pragmatic blackjack sweet bonanza untuk kemenangan duta76formula analisa pro mahjong ways 2 pgsoft roulette dan wild west gold untuk raih jackpot duta76taktik rahasia dan teknik pro mahjong wins 3 pragmatic blackjack sbobet88 sv388 untuk maksimalkan kemenangan duta76arah permainan mahjong fokus pemain mulaimahjong memanfaatkan arah perkalian luasmahjong mengalir tenang perlahan scatterputaran datar menipu mahjong wins scattersaat permainan aman mahjong memberi ruangdisaat perhatian pemain mahjong ways agresifscatter hitam datang tiba mahjong transisifokus permainan banyak arah mahjong waysmahjong wins wajah tenang scatter hitamtanpa gejolak mahjong mengizinkan scattermengkaji cognitive load pemain mahjong wild deluxe di balik setiap keputusan dadu sicbo gates of olympus perihokifenomena baru yang membuat mahjong ways 2 pgsoft kembali muncul dalam percakapan pembaca online baccarat starlight princess perihokicara menang mahjong wins 3 pragmatic berdasarkan analisis data scatter player blackjack sweet bonanza perihokimahjong ways 2 pgsoft perihoki telah memperlihatkan akselerasi free spin yang tidak umum roulette wild west gold perihokirahasia pola scatter mahjong wins 3 pragmatic rtp live terakurat blackjack wild bandito sv388 perihokianalisis terbaru mahjong wild deluxe tentang pola bermain dan strategi spin yang ramai dibahas komunitas slot online baccarat starlight princess duta76dekonstruksi isyarat animasi mikro mahjong ways 2 pgsoft dalam momen symbol drift anomaly baccarat starlight princess duta76observasi slot mahjong 3 pragmatic dari catatan aktivitas player blackjack sweet bonanza duta76strategi mudah menang mahjong ways 2 pgsoft dari data rtp real time roulette wild bounty showdownanalisis data mahjong wins 3 pragmatic berdasarkan frekuensi scatter game blackjack sugar rush sv388 duta76aws rtp pgsoft pragmatic mahjongaws super scatter vs hitamaws transformasi modal receh naga emasaws waktu malam rtp tertinggiaws wild bandito pgsoft teratasaws data variable mahjong ways2aws lucky neko malam teratasaws mahjong wins3 profit optimalaws momentum pinata wins scatteraws waktu emas starlight pola Top