Biggest-ever DDoS attack threatens companies worldwide, and … – World Economic Forum

Companies including Google and Amazon say they have fought off the world’s biggest distributed denial of service (DDoS) attack, but are warning internet users that these types of attacks could cause widespread disruption unless cybersecurity measures are stepped up.
A DDoS attack aims to make a website unreachable by overwhelming it with requests for data. This often results in websites crashing and online services being unavailable.
Google says the attack began in August and was 7.5 times larger than the previous biggest attack, with its site facing a peak of 398 million requests per second.
Google mitigated a DDoS attack which peaked at 398 million requests per second

Cybersecurity firm Cloudflare said the attack was three times larger than anything it has faced before, with more than 201 million requests per second. Amazon’s web services division said it had faced “a new type of DDoS event”.
All three companies said the attackers exploited a weakness in HTTP/2 – a newer version of the HTTP network protocol. They are now urging other firms to update their web servers so they are less vulnerable to such attacks.
“Any enterprise or individual that is serving an HTTP-based workload to the internet may be at risk from this attack,” Google says. “Organizations should verify that any servers they run that support HTTP/2 are not vulnerable, or apply vendor patches for CVE-2023-44487 to limit impact from this attack vector.”

Cybersecurity risks are likely to increase because of generative AI, according to a new UK government report on frontier AI.
The technology will allow the creation of “faster-paced, more effective and larger-scale cyber-intrusion via tailored phishing methods or replicating malware”, the Safety and Security Risks of Generative Artificial Intelligence to 2025 report says. But it does not see hacking becoming fully automated by 2025.
Digital risks such as cyberattacks, online fraud and impersonation are the most likely security threats to emerge because of AI, and will have a bigger impact than other threats, the document says. Overall, it sees generative AI as more likely to exacerbate existing risks rather than create completely new threats in the coming years.
However, the report also says that generative AI will improve the defences available against cyberthreats.
The Global Security Outlook 2023 revealed that 43% of leaders polled believe that a cyberattack will materially affect their organization in the next two years.
The World Economic Forum’s Centre for Cybersecurity drives global action to address systemic cybersecurity challenges. It is an independent and impartial platform fostering collaboration on cybersecurity in the public and private sectors.
Learn more about our impact:
Want to know more about our centre’s impact or get involved? Contact us.

The UK report follows efforts by several international organizations to advance inclusive AI governing frameworks.
In June, for instance, the World Economic Forum launched the AI Governance Alliance to provide guidance on the responsible design, development and deployment of artificial intelligence systems. The UN also set up a global advisory panel to report on the international governance of AI earlier this month.
Relief groups providing aid to Israel and Gaza have had their work and ability to receive donations disrupted by hackers. These so-called “hacktivists” have also targeted infrastructure and disrupted emergency alerts in the region, and large numbers of websites have been disrupted by DDoS attacks, Reuters reports.
European countries should store sensitive data on government-controlled cloud services rather than on systems run by private companies, according to the chief executive of Italian defence and electronics firm Leonardo. “A safe country needs a government cloud, at least for financial, health and defence data,” Roberto Cingolani told the Italian lower house of parliament.
The Octo Tempest cybercrime collective has evolved into one of the world’s “most dangerous financial criminal groups”, according to Microsoft. Its broad “social engineering campaigns” have targeted companies in a wide range of sectors since early 2022, to extort money for the return of stolen data. The group uses impersonation to trick technical administrators into carrying out resets of passwords multifactor authentication methods, Microsoft says.
Cisco Systems is buying cybersecurity firm Splunk in what will be its biggest-ever acquisition. The $28 billion deal will see Cisco absorb a company with a reputation for its work on “data observability”, which helps companies spot potential cybersecurity threats.

The US Cybersecurity and Infrastructure Security Agency (CISA) and Department of Health and Human Services have released a cybersecurity tool kit that includes resources tailored for the healthcare and public health sector. Cybercriminals see healthcare organizations as “high-value yet relatively easy targets” because of the vast range of identity and financial information they hold, the CISA says
A security error on a CIA social media account has been exploited by a cyber-security researcher to draw attention to the issue. A glitch related to how web links sometimes appear on X, formerly known as Twitter, allowed the expert to redirect informants trying to contact the CIA to his own Telegram channel.
Cybercrime is almost always a cross-border event, with criminals targeting victims in foreign countries to reduce the risk of arrest. Moreover, while cyber-enabled fraud and extortion is bad enough, we’re also seeing an increasing number of criminal cyber-attacks that have physical consequences.

The increasing adoption of digital technologies in manufacturing processes has opened up new avenues for cybercriminals to exploit. The Forum’s Cyber Resilience in Manufacturing initiative gathers more than 30 members across the manufacturing ecosystem to develop collective approaches and tools to make the manufacturing sector cyber resilient. These five principles can help manufacturers develop organisational cyber resilience.
Quantum computers could allow malicious actors to break the security algorithms that currently protect most information and communication systems. The “Y2Q” problem bears similarities to the Y2K or millennium bug, but the differences are more serious, from the source of the threat to how to solve the problem.
The expansion of the online world has led to people having larger and larger digital footprints – sometimes including details they would rather the internet forgot. This has led to the implementation of “right to be forgotten” rules in some regions, allowing people to ask for data about them to be removed from the internet. Here’s how it works.

About Us
Events
Media
More from the Forum
Partners & Members
Language Editions
Privacy Policy & Terms of Service
© 2023 World Economic Forum

source

Related Posts

After 6 months and little explanation, Norton Healthcare patients, employees still feeling effects of cyber attack – WDRB

Spotty shower possible. Storms after midnight Updated: April 16, 2024 @ 12:31 pmNorton Healthcare, a company serving about 600,000 patients a year with nearly $5 billion in assets, continues to…

Read more

CA's top cybersecurity job has been vacant for almost 2 years – CalMatters

Technology Californians get hacked all the time. The state’s top cybersecurity job is vacant In summaryGov. Newsom has yet to appoint a commander who is tasked with informing businesses and…

Read more

13 Cyber Security Measures Your Small Business Must Take – Tech.co

Our content is funded in part by commercial partnerships, at no extra cost to you and without impact to our editorial impartiality. Click to Learn MoreCybersecurity has been important to…

Read more

AVG Antivirus Free review – Ghacks

AVG AntiVirus Free is a longstanding security program for Microsoft Windows that protects computer systems from viruses, trojans and other malicious code.One interesting fact about AVG is that it maintains…

Read more

Vlog Episode #247: Chris Long on Improving Technical SEO Skills & Playing Offense SEO – Search Engine Roundtable

In part one, we learned about Chris Long and his experience working with Bill Slawski. Then, in part two, we spoke about helping people with SEO on LinkedIn and using…

Read more

Information Security Vs. Cybersecurity: What's The Difference? – Forbes

Information Security Vs. Cybersecurity: What’s The Difference?  Forbessource

Read more

Leave a Reply

Your email address will not be published. Required fields are marked *