{"id":2406,"date":"2020-11-18T15:03:40","date_gmt":"2020-11-18T15:03:40","guid":{"rendered":"https:\/\/partnernews.sophos.com\/en-us\/?p=2406"},"modified":"2020-11-18T15:16:06","modified_gmt":"2020-11-18T15:16:06","slug":"out-now-sophos-threat-report-2021","status":"publish","type":"post","link":"https:\/\/partnernews.sophos.com\/en-us\/2020\/11\/resources\/out-now-sophos-threat-report-2021\/","title":{"rendered":"Out Now: Sophos Threat Report 2021"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2424 alignright\" src=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2020\/11\/sophos-feat-story-nov-dec-partner-newsletter-threatreport_v3.png\" alt=\"\" width=\"450\" height=\"337\" srcset=\"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2020\/11\/sophos-feat-story-nov-dec-partner-newsletter-threatreport_v3.png 450w, https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2020\/11\/sophos-feat-story-nov-dec-partner-newsletter-threatreport_v3.png?resize=300,225 300w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/>The <a href=\"https:\/\/www.sophos.com\/en-us\/labs\/security-threat-report.aspx\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-taxi-style-rich-style-link=\"{&quot;href&quot;:&quot;https:\/\/www.sophos.com\/en-us\/labs\/security-threat-report.aspx &quot;,&quot;taxi-raw-href&quot;:null}\" data-rendering-method=\"js\">Sophos 2021 Threat Report<\/span><\/a> explores this year\u2019s key cybersecurity developments and their implications for the year ahead.<\/p>\n<p>With insights and analysis from Sophos security researchers and threat hunting experts, it provides a unique, 3D review of the cyberthreat landscape. Topics covered include:<\/p>\n<ul>\n<li>The <strong>future of ransomware:<\/strong> cartels and double whammy attacks<\/li>\n<li><strong data-taxi-rich-text-references=\"{}\" data-taxi-style-rich-style-bold=\"true\">Everyday threats to enterprise<\/strong>, including commodity malware and cryptominers<\/li>\n<li>How\u00a0<strong data-taxi-rich-text-references=\"{}\" data-taxi-style-rich-style-bold=\"true\">COVID has been a force-multiplier\u00a0<\/strong>in attacks<\/li>\n<li>The growing use of\u00a0<strong data-taxi-rich-text-references=\"{}\" data-taxi-style-rich-style-bold=\"true\">Android and Linux platforms\u00a0<\/strong>in cybercrime<\/li>\n<\/ul>\n<p>It&#8217;s free and doesn&#8217;t require to complete a form to get access!<\/p>\n<p><a class=\"btn btn-blue\" href=\"https:\/\/www.sophos.com\/en-us\/labs\/security-threat-report.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Get the Report<\/a><\/p>\n<p>&nbsp;<\/p>\n<h2>The Power of Sharing<\/h2>\n<p>The Sophos Threat Report talks about the &#8220;power of sharing&#8221; &#8211; meaning to share threat intelligence more comprehensively and get better connected. It&#8217;s also a great idea to share this report with your customers and prospects. You can download a co-brandable email template from the Sophos Partner Portal or share the link to the report via LinkedIn, Twitter, Facebook and co.<\/p>\n<p>Don&#8217;t forget to add your <a href=\"https:\/\/partners.sophos.com\/prm\/English\/s\/assets?collectionId=11912\" target=\"_blank\" rel=\"noopener noreferrer\">Lead Referral ID<\/a> though. This way we can give you back every lead created. &#8216;Wait, you said the Threat Report doesn&#8217;t require a form?&#8217; you probably think. And you&#8217;re right. However, the Referral ID sets a cookie and whenever your customer or prospect comes back to www.sophos.com and eventually completes a form for a product trial etc., this lead will get routed back to you.<\/p>\n<p>&nbsp;<\/p>\n<h2>What You Can Expect<\/h2>\n<p>To wet your mouth a bit more, here are the key take-aways from the report:<\/p>\n<h3>Ransomware<\/h3>\n<ul>\n<li>Ransomware threat actors continue to innovate both their technology and their criminal modus operandi at an accelerating pace<\/li>\n<li>More ransomware groups now engage in data theft so they may threaten targets with extortion over the release of sensitive private data<\/li>\n<li>As ransom groups put more effort into active attacks against larger organizations, the ransoms they demand have risen precipitously<\/li>\n<li>Further, distinct threat actor groups that engage in ransomware attacks appear to be collaborating more closely with their peers in the criminal underground, behaving more like cybercrime cartels than independent groups<\/li>\n<li>Ransomware attacks that previously took weeks or days now may only require hours to complete<\/li>\n<\/ul>\n<h3>&#8216;Everyday&#8217; threats<\/h3>\n<ul>\n<li>Server platforms running both Windows and Linux have been heavily targeted for attack, and leveraged to attack organizations from within<\/li>\n<li>Common services like RDP and VPN concentrators remain a focus for attack on the network perimeter, and threat actors also use RDP to move laterally within breached networks<\/li>\n<li>Even low-end &#8220;commodity&#8221; malware can lead to major breaches, as more malware families branch out into becoming &#8220;content distribution networks&#8221; for other malware<\/li>\n<li>A lack of attention to one or more aspects of basic security hygiene has been found to be at the root cause of many of the most damaging attacks we&#8217;ve investigated<\/li>\n<\/ul>\n<h3>COVID-19<\/h3>\n<ul>\n<li>Working from home presents new challenges, expanding an organization&#8217;s security perimeter to thousands of home networks protected by widely varying levels of security<\/li>\n<li>Cloud computing has successfully borne the brunt of a lot of enterprise needs for secure computing environments, yet still has its own challenges unique from those in a traditional enterprise network<\/li>\n<li>Threat actors have attempted to launder their reputations making promises not to target organizations involved in life-saving health operations, but later reneged on those promises<\/li>\n<li>Criminal enterprises have branched out into a service economy that eases new criminals into the fold<\/li>\n<li>Cybersecurity professionals from around the world self-organized in 2020 into a rapid reaction force to combat threats that leverage the social engineering potential of anything relating to the novel Coronavirus<\/li>\n<\/ul>\n<h3>Nontraditional platforms<\/h3>\n<ul>\n<li>Attackers now routinely take advantage of the wealth of &#8220;red team&#8221; tools and utilities pioneered by penetration testers in live, active attacks<\/li>\n<li>Despite efforts on the part of operators of mobile platforms to monitor apps for malicious code, attackers continue to work around the edges, developing techniques to bypass these code scans<\/li>\n<li>Software classified in an earlier era as &#8220;potentially unwanted&#8221; because it delivered a plethora of advertisements (but was otherwise not malicious) has been engaging in tactics that are increasingly indistinguishable from overt malware<\/li>\n<li>Data scientists have applied approaches borrowed from the world of biological epidemiology to spam attacks and malware payloads, as a method to bridge gaps in detection<\/li>\n<\/ul>\n<p><a class=\"btn btn-blue\" href=\"https:\/\/www.sophos.com\/en-us\/labs\/security-threat-report.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Get the Report<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Navigating cybersecurity in an uncertain world.<\/p>\n","protected":false},"author":11,"featured_media":3000002422,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[132,21],"coauthors":[64],"class_list":["post-2406","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-resources","tag-sophos-threat-report","tag-threats-malware"],"jetpack_featured_media_url":"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2020\/11\/featured-image-threat-report-2021.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/2406","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/comments?post=2406"}],"version-history":[{"count":16,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/2406\/revisions"}],"predecessor-version":[{"id":2427,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/2406\/revisions\/2427"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/media?parent=2406"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/categories?post=2406"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/tags?post=2406"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/coauthors?post=2406"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}