Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

WatchGuard warns of Vaporworms, Global Internet Disruption and Rogue AI Chatbots for 2019

WatchGuard Technologies’ information security predictions for 2019 include the emergence of ’vaporworms’, a new breed of fileless malware with wormlike properties to self-propagate through vulnerable systems, along with a takedown of the internet itself and ransomware targeting utilities and industrial control systems. WatchGuard’s Threat Lab research team developed these predictions based on an analysis of major security and threat trends over the past year.

Read More: Interview with Angel Gambino, CEO and Founder of Sensai

“Cyber criminals are continuing to reshape the threat landscape as they update their tactics and escalate their attacks against businesses, governments and even the infrastructure of the internet itself,” said Corey Nachreiner, chief technology officer at WatchGuard Technologies. “The Threat Lab’s 2019 predictions span from highly likely to audacious, but consistent across all eight is that there’s hope for preventing them. Organisations of all sizes need to look ahead at what new threats might be around the corner, prepare for evolving attacks and ensure they’re equipped with layered security defences to meet them head-on.”

Related Posts
1 of 40,574

Read More: Interview with Ben Goertzel, CEO at SingularityNET

The WatchGuard Threat Lab’s 2019 Security Predictions are:

  1. Vaporworms or Fileless malware worms will emerge. Fileless malware strains will exhibit wormlike properties in 2019, allowing them to self-propagate by exploiting software vulnerabilities. Fileless malware is more difficult for traditional endpoint detection to identify and block because it runs entirely in memory, without ever dropping a file onto the infected system. Combine that trend with the number of systems running unpatched software vulnerable to certain exploits and 2019 will be the year of the vaporworm.
  2. Attackers hold the Internet hostage. A hacktivist collective or nation-state will launch a coordinated attack against the infrastructure of the internet in 2019. The protocol that controls the internet (BGP) operates largely on the honour system, and a 2016 DDoS attack against hosting provider Dyn showed that a single attack against a hosting provider or registrar could take down major websites. The bottom line is that the internet itself is ripe for the taking by someone with the resources to DDoS multiple critical points underpinning the internet or abuse the underlying protocols themselves.
  3. Escalations in State-level cyber attacks force a UN Cyber Security Treaty. The UN will more forcefully tackle the issue of state-sponsored cyber attacks by enacting a multinational Cyber Security Treaty in 2019.
  4. AI-Driven chatbots go rogue. In 2019, cyber criminals and black hat hackers will create malicious chatbots on legitimate sites to socially engineer unknowing victims into clicking malicious links, downloading files containing malware, or sharing private information.
  5. A major biometric hack will be the beginning of the end for single-factor authentication. As biometric logins like Apple’s FaceID become more common, hackers will take advantage of the false sense of security they encourage and crack a biometric-only login method at scale to pull off a major attack. As a result, 2019 will see strong growth in the use of multi-factor authentication (MFA) for added protection among groups with more security knowledge, particularly push-based authentication and MFA for Cloud application defence.
  6. A nation-state to take ’Fire Sale’ attacks from fiction to reality. In the Die Hard movie series, a ‘fire sale’ was a fictional three-pronged cyber attack, targeting a city or state’s transportation operations, financial systems, public utilities and communication infrastructure. The fear and confusion caused during this attack was designed to allow the terrorists to siphon off huge sums of money undetected. Modern cyber security incidents suggest that nation-states and terrorists have developed these capabilities, so 2019 may be the first year one of these multi-pronged attacks is launched to cover up a hidden operation.
  7. Hackers to cause real-world blackouts as targeted ransomware focuses on utilities and industrial control systems. Targeted ransomware campaigns will cause chaos in 2019 by targeting industrial control systems and public utilities for larger payoffs. The average payment demand will increase by over 6500 percent, from an average of $300 to $20,000 per attack. These assaults will result in real-world consequences like city-wide blackouts and the loss of access to public utilities.
  8. A WPA3 Wi-Fi network will be hacked using one of the six Wi-Fi threat categories. Hackers will use rogue APs, Evil Twin APs, or any of the six known Wi-Fi threat categories (as defined by the Trusted Wireless Environment Framework) to compromise a WPA3 Wi-Fi network, despite enhancements to the new WPA3 encryption standard. Unless more comprehensive security is built into the Wi-Fi infrastructure across the entire industry, users can be fooled into feeling safe with WPA3 while still being susceptible to attacks like Evil Twin APs.

Read More: Palo Alto Networks Appoints Amit K. Singh as President

19 Comments
  1. Copper sulfate recycling Copper recycling innovations Scrap metal refurbishing
    Copper cable scrap recovery rates, Scrap metal disposal services, Copper scrap processing plant

  2. This is the right blog for anybody who really wants to find out about this topic. You realize so much its almost hard to argue with you (not that I personally would want toHaHa). You definitely put a brand new spin on a topic that has been written about for decades. Great stuff, just great!

  3. Heya i’m for the first time here. I came across this board and I find It truly useful & it helped me out a lot. I hope to give something back and help others like you helped me.

  4. Hi there to all, because I am truly keen of reading this weblog’s post to be updated regularly. It contains nice data.

  5. Can I just say what a relief to find someone who actually knows what they’re talking about online. You definitely understand how to bring an issue to light and make it important. More and more people must read this and understand this side of the story. I was surprised that you’re not more popular since you surely have the gift.

  6. This blog was… how do I say it? Relevant!! Finally I have found something that helped me. Appreciate it!

  7. You should take part in a contest for one of the greatest blogs on the net. I am going to recommend this blog!

  8. хот фиеста c***** says

    When someone writes an article he/she keeps the thought of a user in his/her mind that how a user can know it. So that’s why this piece of writing is great. Thanks!

  9. I don’t know if it’s just me or if everyone else experiencing problems with your blog. It looks like some of the text on your posts are running off the screen. Can someone else please comment and let me know if this is happening to them too? This could be a problem with my browser because I’ve had this happen before. Appreciate it

  10. 7k c***** играть says

    I’ve read some just right stuff here. Definitely value bookmarking for revisiting. I wonder how so much attempt you put to create one of these magnificent informative web site.

  11. Теннис онлайн says

    I blog quite often and I truly appreciate your content. This article has really peaked my interest. I am going to book mark your website and keep checking for new information about once a week. I subscribed to your RSS feed as well.

  12. Wow, this piece of writing is good, my sister is analyzing these things, thus I am going to let know her.

  13. Строительство автомоек под ключ – это возможность получить готовое к эксплуатации и прибыльное предприятие без лишних хлопот.

  14. Строительство автомойки – это ответственный процесс, требующий знаний и опыта. Наша команда гарантирует качество и соблюдение всех норм.

  15. I feel this is one of the such a lot important information for me. And i’m glad reading your article. However wanna observation on few general things, The site taste is ideal, the articles is in reality nice : D. Just right task, cheers

  16. Jac Благовещенск says

    Do you mind if I quote a couple of your posts as long as I provide credit and sources back to your webpage? My blog site is in the very same area of interest as yours and my visitors would definitely benefit from a lot of the information you present here. Please let me know if this okay with you. Cheers!

  17. theguardian says

    No matter if some one searches for his required thing, so he/she wants to be available that in detail, so that thing is maintained over here.

  18. theguardian.com says

    I think the admin of this web site is in fact working hard for his website, as here every stuff is quality based stuff.

Leave A Reply

Your email address will not be published.