Check Point Research (CPR), the Threat Intelligence division of Check Point Software Technologies Ltd., unveiled its highly anticipated 2024 Annual Security Report. The report sheds light on the escalating ransomware surge and the innovative use of artificial intelligence (AI) in defending against cyber threats.
Amid a tumultuous year in cybersecurity, the report reveals a staggering 90% increase in victims publicly extorted through ransomware attacks. Ransomware incidents now make up 10% of all malware detected by Check Point’s sensors. The Check Point Incident Response Team reported that nearly half of their cases involved ransomware, with the number of publicly shamed victims reaching approximately 5,000, representing a twofold increase from the previous year.
Key highlights from the 2024 Security Report include:
– Ransomware Evolution: Attackers are honing their tactics, exploiting zero-day vulnerabilities and enhancing Ransomware-as-a-Service (RaaS) with novel extortion methods. High-profile targets are increasingly becoming prime targets, underscoring the importance of robust defense mechanisms.
– Targeting Edge Devices: A growing trend in attacks on edge devices underscores the critical need for comprehensive security measures that cover all network components.
– Rise in Hacktivism: State-sponsored hacktivism is on the rise, with significant spikes in cyber activities linked to geopolitical conflicts. The use of destructive wipers for maximum impact highlights the evolving landscape of cyber warfare.
Maya Horowitz, VP of Research at Check Point, emphasized the necessity for organizations to adapt to the ever-changing cyber threats landscape. Strengthening defenses with advanced AI-powered and cloud-based cybersecurity solutions, along with fostering collaboration, is crucial in effectively mitigating these evolving risks.
The 2024 Security Report serves as a valuable resource for organizations, policymakers, and cybersecurity professionals, offering in-depth insights into attack trends and recommendations for boosting cyber resilience. The findings are based on data sourced from the Check Point ThreatCloud AI Cyber-Threat Map, which provides a comprehensive look at the key strategies employed by cybercriminals in their attacks.