The world is more connected than ever before, but with this comes more opportunities for cybercriminals to take advantage of vulnerabilities. Cybersecurity plays an essential role in protecting our privacy, rights and digital freedom. Get a glimpse of what cybersecurity threats 2020 may have in store by reviewing the 10 worst hacks, cyberattacks, and data breaches that occurred in 2019.
- Container threats
A container image is a self-contained piece of software that has code, tools, and resources in it needed to run independently. Containers or self-contained applications allow businesses to install microservices and applications at an incredible rate and scale, but there were significant security issues within container images in 2019. Although they are driving evolution in the management of network applications, they are vulnerable. The initial entry point of container images needs serious screening and security. Companies are advised to use only official images or build their own.
- The rise of Kubernetes tools
Kubernetes (or k8s) is an open-source container orchestration system for automating deployment, scaling and management of application containers. Kubernetes tools will increasingly be adopted in 2020 and will be the target of more attacks. “It’s like a nefarious version supply and demand; the greater the supply of Kubernetes clusters running in production, the greater “demand” there will be among bad actors trying to find security holes” (Kevin Casey: 2019).
- Continued threat of Android malware
The global Android market share rose to 87% in 2019 (IDC) with over 2.5 billion active Android devices making them targets for attacks. Google announced that it is exploring a more secure platform by moving toward the Linux mainline kernel after attacks like xHelper and Joker, and adware attacks were found in Google Play Store apps.
- Capital One breach
Former Amazon software engineer Paige Thompson is accused of breaching the server of a third-party cloud company used by Capital One bank, and was indicted for stealing over 106 million records – making it one of the biggest breaches in history. Thompson allegedly built a custom scanning tool that searched the web for cloud servers that were misconfigured allowing outsiders to access username and password credentials, or mine for cryptocurrency.