A Look Ahead to 2022: McAfee Enterprise & FireEye Predict Top Cyber Threats

A Look Ahead to 2022: McAfee Enterprise & FireEye Predict Top Cyber Threats

October 28, 2021 Off By David
Object Storage

McAfee Enterprise and FireEye released its 2022 Threat Predictions, examining the top cybersecurity threats they predict enterprises will face in 2022.

Bad actors have taken note of successful tactics from 2021, including those making headlines tied to ransomware, nation states, social media and the shifting reliance on a remote workforce. We expect them to pivot those into next years’ campaigns and grow in sophistication, wielding the potential to wreak more havoc across the globe.

Skilled engineers and security architects from the recently combined entity offer a preview of how the threat landscape might look in 2022 and how these new or evolving threats could potentially impact enterprises, countries, and civilians.

“Over this past year, we have seen cybercriminals get smarter and quicker at retooling their tactics to follow new bad actor schemes – from ransomware to nation states – and we don’t anticipate that changing in 2022,” said Raj Samani, fellow and chief scientist of the combined company.

“With the evolving threat landscape and continued impact of the global pandemic, it is crucial that enterprises stay aware of the cybersecurity trends so that they can be proactive and actionable in protecting their information.”

McAfee Enterprise & FireEye 2022 Predictions:

1. Lazarus Wants to Add you as a Friend. Nation States will weaponize social media to target more enterprise professionals, looking to infiltrate organizations for their own criminal gain.

2. Help Wanted: Bad Guys with Benefits. Nation states will increase their offensive operations by leveraging cybercriminals, prompting companies to audit their visibility and learn from operations conducted by actors targeting their sectors.

3. Game of Ransomware Thrones. Self-reliant cybercrime groups will shift the balance of power within the RaaS eco-kingdom from those who control the ransomware to those who control the victim’s networks.

4. Ransomware For Dummies. Less-skilled operators won’t have to bend the knee in RaaS model power shift as they leverage the expertise encoded by more skilled ransomware developers.

5. Keep A Close Eye on API. 5G and IoT traffic between API services and apps will make them increasingly lucrative targets, causing unwanted exposure of information.

6. Hijackers Will Target Your Application Containers. Expanded exploitation of containers and vulnerable applications will lead to endpoint resource takeovers.

7. Zero Cares About Zero-Days. The time to repurpose vulnerabilities into working exploits will be measured in hours and there’s nothing you can do about it… except patch.