Fifa 18 webapp software#
Ian Pratt says both SMBs and high-profile victims may be targeted: “Kaseya demonstrated a pathway to monetization for independent software vendor (ISV) breaches. This only adds fuel to the fire, giving threat actors more than enough motivation to exploit software supply chains in the next year.” This could lead to the continued commoditization of the tactics, techniques, and procedures (TTPs) used to conduct such attacks. According to Michael Heywood: “We’ll see supply chain attacks continue to rise over the next year as threat actors search for weak links in software supply chains, targeting software being used widely and globally, or used by a specific company.”Īs Joanna Burkey explains, this approach could create economies of scale for threat actors: “With the Kaseya breach – which impacted over 1,500 companies – we saw that supply chain attacks can be financially rewarding.
Supply chain attacks are likely to continue to present new opportunities for threat actors in 2022. Increasing commoditization of software supply chain attacks could result in more high-profile victims targeted Ian Pratt, Global Head of Security for Personal Systems Patrick Schläpfer, Malware Analyst Alex Holland, Senior Malware Analyst Julia Voo, Global Lead Cybersecurity and Tech Policy and Michael Howard, Head of Security and Analytics Practice alongside HP Security Advisory Board member and Partner at Deloitte, Robert Masse – identifying four key trends to look out for.ġ. Here, we include insights from a range of HP security experts – including: Michael Heywood, Supply Chain Security Lead Joanna Burkey, CISO Dr. From ransomware pile-ons to increasingly commoditized supply chain TTPs, weaponized firmware exploits and targeted attacks on hybrid workers – the threat landscape is set to evolve at a worrying pace in the year ahead.Īs 2021 draws to a close, our HP security experts and advisors have been reflecting on what the year ahead has in store.