Top Three Cybersecurity Predictions for 2018

Posted by Madeline Lee   |   December 14, 2017

Mike Davis, CTO of CounterTack – As 2018 rapidly approaches, there is one thing we know for certain – cybersecurity will continue to dominate business, technology and mainstream media. The words “ransomware” “phishing” and “crypto miner” will be included in everyday conversations regardless of age, career or nationality. No longer are these terms confined to those in IT.  The following are my top three cybersecurity predictions for 2018.


  1. It’s no surprise that we will see an increase in Internet of Things (IoT) security breaches in 2018. But as these attacks begin to surge, so will the research into how and why these attacks took place and how to prevent them. The downside is that attackers will leverage this research to significantly expand their knowledge, increasing the number sophisticated attacks. IoT attacks in 2018 will make the Miria Botnet less significant.Depositphotos_14805247_s-2015.jpg
  1. Attackers will continue to get smarter throughout 2018. As their hacking arsenal increases by the day, they are discovering more ways to break in and wreak havoc. Think of each attacker carrying a multi-faceted arsenal of weapons. As this trend continues, companies and researchers need to look at the behavior of the attackers post-breakin, and based upon that behavior, predict how the weapon will be used. The weapons and attackers are becoming more sophisticated and companies will only be able to effectively protect their environment from learning from this behavior. In 2018 companies need to move away from the threat itself to the impact of the threat.
  1. In 2017 the price of a Bitcoin exploded from under $1,000 in January to more than $18,000 in early December, earning the top cryptocurrency a market capitalization of more than $278 Billion. The main driver of this explosion is Ransomware: the success of these attacks has positively impacted the crypto currency market. 



So, what's next for those looking to “cash in”? Attackers no longer need to corrupt your computer for extortion; they only need to gain access to a website to benefit from crypto currency mining. All computers are now a resource for thievery; simply viewing a crypto miner modified attack page adds local CPU and memory to the shared “botnet”. This technique allows attackers to dramatically scale up their mining efforts at minimal cost, enabling them to net more crypto currency at a dramatic rate. Expect this issue to dominate the cryptocurrency headlines in 2018.

Topics: Predictions, malware, cybersecurity, endpoint security, CounterTack, EDR, endpoint detection and response, Email Phishing, Ransomware, MSSP, IoT, advanced attacks, crypto miner, MDR, internet of things, crypto currency, bitcoin, fileless, zero day

Subscribe to Email Updates

Recent Posts

Posts by Topic

see all