Mobile

5/10/2017
03:25 PM
50%
50%

'Systemic' Cyberattack Most Likely to Hit Financial, Energy Sectors

The financial services industry is among the top five industries that likely face a systemic cyberattack, according to a survey released today.

A systemic cyberattack attack that simultaneously affects multiple companies is likely to occur this year, with the financial services industry ranked at the top of the list of targeted sectors, according to a survey released today by American International Group (AIG).

AIG queried 70 cybersecurity, technology, and insurance professionals, in the study, and found that the industries most likely to face a systemic attack this year are:

  • financial services, with financial networks and transaction systems at greatest risk (19%)
  • power and energy, with the Internet infrastructure a likely target (15%)
  • telecommunications and utilities, with the power grid at risk (14%)
  • healthcare, with the healthcare system a likely target (13%) 
  • information technology, with software and hardware organizations getting hit, thus disabling the backbone of the digital economy (12%)

More than half of the survey respondents believe a simultaneous attack will occur involving five- to 10 companies, while one-third of those surveyed believe there is more than an even chance that as many as 50 companies will be attacked simultaneously. As for the remaining 20% of survey respondents, they think the number of companies that could be attacked at once could reach into as many as 100 businesses.

Read more about the survey here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RahulB593
50%
50%
RahulB593,
User Rank: Apprentice
5/11/2017 | 2:58:30 AM
cyber attack
This articles are truly great. very informative post.
WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
NSS Labs Files Antitrust Suit Against Symantec, CrowdStrike, ESET, AMTSO
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/19/2018
Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Mukul Kumar & Anupam Sahai, CISO & VP of Cyber Practice and VP Product Management, Cavirin Systems,  9/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Are you sure this is how we get our data into the cloud?
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14633
PUBLISHED: 2018-09-25
A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The at...
CVE-2018-14647
PUBLISHED: 2018-09-25
Python's elementtree C accelerator failed to initialise Expat's hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by contructing an XML document that would cause pathological hash collisions in Expat's internal data structures, consuming larg...
CVE-2018-10502
PUBLISHED: 2018-09-24
This vulnerability allows local attackers to escalate privileges on vulnerable installations of Samsung Galaxy Apps Fixed in version 4.2.18.2. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exist...
CVE-2018-11614
PUBLISHED: 2018-09-24
This vulnerability allows remote attackers to escalate privileges on vulnerable installations of Samsung Members Fixed in version 2.4.25. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists wit...
CVE-2018-14318
PUBLISHED: 2018-09-24
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Samsung Galaxy S8 G950FXXU1AQL5. User interaction is required to exploit this vulnerability in that the target must have their cellular radios enabled. The specific flaw exists within the handling of ...