ARTICLE
19 March 2020

Big Surprise! Cybercriminals Are Innovative And Creative With New Cyberattacks!

FL
Foley & Lardner

Contributor

Foley & Lardner LLP looks beyond the law to focus on the constantly evolving demands facing our clients and their industries. With over 1,100 lawyers in 24 offices across the United States, Mexico, Europe and Asia, Foley approaches client service by first understanding our clients’ priorities, objectives and challenges. We work hard to understand our clients’ issues and forge long-term relationships with them to help achieve successful outcomes and solve their legal issues through practical business advice and cutting-edge legal insight. Our clients view us as trusted business advisors because we understand that great legal service is only valuable if it is relevant, practical and beneficial to their businesses.
Darkreading.com reported that "We're in an arms race with cybercriminals.
United States Technology

Darkreading.com reported that "We're in an arms race with cybercriminals. Adversaries are becoming stealthier and more dangerous, constantly improving their attack techniques to evade the best security defenses. From malicious mobile apps to exploited cloud misconfigurations and devastating Remote Desktop Protocol (RDP) exploits, there's no shortage of threats we need to protect against." The March 9, 2020 article entitled "Threat Awareness: A Critical First Step in Detecting Adversaries" included these comments about "Scamming Through Stealthy, Malicious Apps":

Smartphones, tablets, and other mobile devices are rich environments for attacks. Not only can attackers steal user information and cash or cryptocurrency, but they can also use mobile devices to gain access to corporate resources.

And these comments about "Exploiting Misconfiguration in the Cloud":

The strengths that make cloud such a valuable platform for computing and business operations — flexibility, speed and ease of use — are also what makes it challenging to secure. With changes happening at the rapid pace of cloud, operator error is a growing risk. All it takes is one misstep in configuration to expose the entire customer database to attack.

No one is surprised, right?

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More