Saturday, February 22, 2025
HomeSecurity NewsNew Black Hat Asia Research: More than 70% of Security Professionals Predict...

New Black Hat Asia Research: More than 70% of Security Professionals Predict a Major Data Breach Across Asian Countries in the Next Two Years

Published on

SIEM as a Service

Follow Us on Google News

Cyber attacks levels have raised concerning the IT security professionals across the globe, and Asia is not an exception to it. A majority of the respondents in Black Hat Asia 2018 survey believe their organizations will have to respond to a major security incident in the next 12 months.

Most security professionals in Asia are convinced that a cyber attack can disrupt essential infrastructure across multiple countries within the region at intervals 2 years.

Many doubt their ability to defend against knowledge breaches and stand up to new threats. there’s the maximum amount concern concerning targeted attacks from highly sophisticated adversaries, as well as risks display by careless, negligent, and malicious insiders.

Critical Infrastructure Breaches

A majority of IT security leaders in Asia are convinced that a major, effective cyber attack
on critical infrastructure in their country, or multiple countries in the region is up and coming.

Targeted cyber attacks on specific organizations have turned into a developing issue for security experts all around.

In recent years, threat actors have refocused their exploits from the mass, opportunistic attacks of the past to attacks that are highly targeted and focused on specific objectives such as data theft or extortion via ransomware.

According to Black Hat Asia 2018 survey, more than 23% of the respondents believe that cyber espionage by large nation states represents the greatest threat to Asia’s critical infrastructure, followed by potential attacks by organized crime groups (21%).

Also Read How to protect your Organization From DDOS Attack

Security Professionals’ Greatest Concerns

IT and security managers in Asia are more concerned about sophisticated attacks targeted
specifically at their organizations than about any other threat and 56% of the respondent’s listed targeted attacks as their top challenge.

The majority of the respondents in the Blackhat Asia survey are concerned about the threat to enterprise data posed by malicious actors in Russia, China, and North Korea.

Black Hat Asia

At end-of-year 2017 report from Flashpoint indicates that state-sponsored attackers from Russia and North Korea and, to a lesser extent, China ramped up their activities last year in response to various geopolitical factors.

Serious New Cybersecurity Threat – Black Hat Asia 2018

Beyond targeted attacks and phishing, our respondents had diverse views on their current
security concerns.

Twenty-six percent cited polymorphic malware as one of their biggest issues, while almost an equal proportion (24%) pointed to sabotage and data theft by malicious insiders.

Some of the top concerns listed by respondents were accidental data leaks (15%), Internet of Things (IoT) threats (15%), attacks on cloud services (14%), and espionage by a foreign government (10%).

Targeted attacks, as noted previously, remained the top-expected concern for 2020, suggesting that security professionals in the region see it as a long-term issue.

Sufficient Security Budget & Staff

Budget and skills shortage has been a perennial problem for cybersecurity managers everywhere. Gartner, for instance, expects worldwide enterprise security spending to top $96 billion in 2018, an increase of 8% from $89 billion in 2017 and 17% higher than the $82 billion spent in 2016.

Black Hat Asia

The relative shortage of security staff among our Asian survey respondents is a manifestation of a much broader problem.Compared to other regions, the security staffing situation in Asia is actually better but only marginally so.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...

Threat Actors Trojanize Popular Games to Evade Security and Infect Systems

A sophisticated malware campaign was launched by cybercriminals, targeting users through trojanized versions of...

New FUD Malware Targets MacOS, Evading Antivirus and Security Tools

A new strain of Fully Undetectable (FUD) macOS malware, dubbed "Tiny FUD," has emerged,...