• Latest
  • All
  • How To
Contrary to Popular Belief, Linux Sytems Are Now Receiving Their Fair Share of Cyberattacks

Contrary to Popular Belief, Linux Sytems Are Now Receiving Their Fair Share of Cyberattacks

October 28, 2022
kenya-parliament

Parliament Invites Public Feedback on Virtual Asset Bill 2025

May 30, 2025
ConnectedAfrica2025(Day4)-meta-foondamate

Connected Africa 2025 Day 4: FoondaMate and Meta Team Up to Bring AI to Classrooms

May 29, 2025
google-veo-3

Actors and Film Crews Are Worried About Veo 3 Taking Their Jobs

May 29, 2025
iOS 26

Apple Plans Big Rename for iOS and macOS at WWDC 2025

May 29, 2025
DHgate Tablet Cases deals
University student fined for defamatory Facebook posts

University Student Fined KES 7.5 Million for Defamatory Facebook Posts

May 29, 2025
AI Africa policies database

New Platform Brings All African AI Policies Under One Database

May 28, 2025
POATE 2025

Kenya’s Tourism Sector Grows as Travel Gets Easier Across East Africa

May 28, 2025
sodium-ion battery

Researchers Develop Sodium-Ion Battery That Charges to 80% in 6 Minutes

May 27, 2025
TV Gambling Ads

Regulator Fines Stations Using Religious Shows to Push Gambling

May 27, 2025
Connected Africa Summit 2025

Connected Africa 2025 Day 2: Focus on Digital Inclusion & Cybersecurity

May 27, 2025
whatsapp chatbots

iPad Users May Finally Get a Native WhatsApp App

May 28, 2025
Connected Africa Summit

Connected Africa Summit Calls for Unified Tech Vision

May 28, 2025
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
No Result
View All Result

Contrary to Popular Belief, Linux Sytems Are Now Receiving Their Fair Share of Cyberattacks

Kenn Abuya by Kenn Abuya
October 28, 2022
in News
Reading Time: 3 mins read
251
0

What happened over the period the COVID-19 pandemic started and when it reached its peak? Well, more people went online for work, school, entertainment, and more. To this end, it has been reported that over 73% of Information Technology security decision-makers are concerned about the growing digital attack space.

 A report released by Trend Micro has revealed several interesting trends and developments within the cybersecurity space. The continued growth of threat detections, which has increased exponentially since the pandemic forced greater adoption of digital functions, is one key finding.

The report states that many IT decision-makers are concerned about the rapid digitalization, with 43% claiming that the digital attack surface is spiraling out of control and 37% describing it as constantly evolving and messy.

“In light of the challenges faced by IT professionals, it is clear that there is a need for improved investment and understanding of the cyber-attack landscape,” the report says in part.

READ MORE: Retail Industry Second Most Targeted Industry by Ransomware in 2021

Additional highlights in the report include the following:

  • While new malware tends to receive the lion’s share of the spotlight, the first half of 2022 saw a significant resurgence of old favourite commodity malware, Emotet. Despite its infrastructure being taken down in 2021, the report showed detections of the botnet increased from 13,811 in H1 2021 to 148,701 in H1 2022. 
  • Cyber warfare is a growing trend with prominent groups launching attacks on Ukrainian targets before and during the conflict with Russia. In addition to this, other threat actors are targeting individuals outside of the conflict, capitalizing on curiosity and sympathy. Turning their attention away from dwindling interest in Covid-19, many are now using requests for donations as a guise for their spam emails. According to a recent report from Interpol, online scams through text messages and email top the list of most prominent threats in Africa. This is supported by Trend Micro’s regional statistics for H1 2022, which show well over 2.4 million blocked mails in the region. 
  • Ransomware as a service (RaaS) continues to grow as a threat with LockBit, Conti, and BlackCat at the helm. This profitable approach to cybercrime allows would-be cybercriminals to access tools and infrastructure that otherwise would not have been available to them. The RaaS system places the responsibility of infection on affiliates, providing developers with a layer of protection and additional time in which to evolve their malware. The growing popularity of this approach is largely responsible for the 2.5 million detections worldwide, of which nearly 200,000 occurred in Africa. 

READ MORE: After 2017’s WannaCry Attacks, Ransomware is Still the Number One Online Threat

  • Linux systems have become an attractive option for malicious actors looking to concentrate on servers and embedded systems, both areas where Linux is expected to see growth in the next few years. The new focus on the operating system became clear in H1 2022 which saw a 75% increase in ransomware attacks targeting Linux machines. This emerging trend is concerning to organizations as targeted infrastructure forms part of their critical infrastructure and successful attacks have the potential to deal significant damage. 
  • As investment in Cloud Computing in Africa continues to grow, new security challenges are emerging. Top of this list are cloud tunneling and containers. While cloud tunneling allows users to swiftly deploy assets and services – it can also prevent full visibility of the deployed assets. Trend Micro found attackers are taking advantage of this by launching attacks in unconventional places where IT teams tend not to look. Similarly, containers offer organizations increased speed and efficiency in their development cycles. However, many have failed to implement proper security controls, which can lead to compromise at various stages of the pipeline. Misconfigured container software remained a top concern in H1 2022 with 53% of respondents in a recent Red Hat survey reporting misconfiguration detection on their containers. 

Quote

“Although most detections and attacks are still aimed overseas, it is crucial that Africa invest in improved security measures. A critical part of this investment must be focused on resolving the skills shortage. While a comprehensive security solution like Trend Micro One can provide your systems with protection, skills development programs will play a key role in ensuring a safe future,” says Emmanuel Tzingakis, technical lead of sub-Saharan Africa.

Tags: CybersecurityLinux
SendShare147Tweet92
Kenn Abuya

Kenn Abuya

Kenn Abuya is a friend of technology, with bias in enterprise and mobile tech. Share your thoughts, tips and hate mail at [email protected]

Related Posts

Connected Africa Summit 2025

Connected Africa 2025 Day 2: Focus on Digital Inclusion & Cybersecurity

May 27, 2025
NSSF Hacking Claims Disputed: Fund Says No Member Data Compromised

NSSF Denies Allegations of Massive 2.5TB Data Breach

May 21, 2025
Tanzania Police X Account

Tanzania Police X Account Hacked Amid Rising Political Tensions

May 21, 2025
apple trump

Apple Warns iPhone Users in 100 Countries of Targeted Spyware Attacks

May 6, 2025
KICTANet Cybersecurity Memo

KICTANet Pushes for Changes to Kenya’s Draft Cybersecurity Strategy

April 26, 2025
Web DDOS Tsunami Attack

Web DDoS Tsunamis Are the Next Big Cyber Threat to Organizations

April 25, 2025

Latest

kenya-parliament

Parliament Invites Public Feedback on Virtual Asset Bill 2025

May 30, 2025
ConnectedAfrica2025(Day4)-meta-foondamate

Connected Africa 2025 Day 4: FoondaMate and Meta Team Up to Bring AI to Classrooms

May 29, 2025
google-veo-3

Actors and Film Crews Are Worried About Veo 3 Taking Their Jobs

May 29, 2025
iOS 26

Apple Plans Big Rename for iOS and macOS at WWDC 2025

May 29, 2025
University student fined for defamatory Facebook posts

University Student Fined KES 7.5 Million for Defamatory Facebook Posts

May 29, 2025
AI Africa policies database

New Platform Brings All African AI Policies Under One Database

May 28, 2025

Best devices

budget smartwatches 2025

Best Budget Smartwatches To Buy in Kenya 2025

February 13, 2025

Best Infinix Smartphones To Buy in Kenya 2024

February 13, 2025

Best Laptops for Battery Life in 2024

August 21, 2024

Best “Battery Warrior” Smartphones To Buy in 2024

August 22, 2024

Parliament Invites Public Feedback on Virtual Asset Bill 2025

May 30, 2025

Connected Africa 2025 Day 4: FoondaMate and Meta Team Up to Bring AI to Classrooms

May 29, 2025

Techweez is a fast growing influential source of technology news, reviews and analysis by leading tech geeks in the industry.

Follow Us

Editorials

Actors and Film Crews Are Worried About Veo 3 Taking Their Jobs

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

Trump’s Tariffs Will Be the End of Affordable Tech

5 Ways to Prep Your Tech for Resale

The Weaponization of PDFs: How Cybercriminals Are Exploiting a Trusted Format

Introducing A Brainbox Quiz: Techweez’s Monthly Trivia Night!

More News

Kenya’s Tourism Sector Grows as Travel Gets Easier Across East Africa

Researchers Develop Sodium-Ion Battery That Charges to 80% in 6 Minutes

Regulator Fines Stations Using Religious Shows to Push Gambling

Connected Africa 2025 Day 2: Focus on Digital Inclusion & Cybersecurity

iPad Users May Finally Get a Native WhatsApp App

Connected Africa Summit Calls for Unified Tech Vision

  • Terms Of Use
  • Techweez Brand
  • Privacy & Policy
  • Contact Us

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!

Hey there! Just a heads-up: we're big fans of cookies - both the digital and edible kind! 🍪 We use our cookies and some from third parties to ensure your browsing experience on our site is smooth sailing and secure.

 

But wait, there's more! We also use cookies to gather stats and insights on how you navigate our site. It's like getting a behind-the-scenes peek at your digital adventures!

 

Don't worry, you're in control. You can adjust your cookie settings anytime to suit your preferences. Feeling curious? Dive into our Privacy Policy for all the juicy details. Happy browsing! 🚀

Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
No Result
View All Result
  • News
  • Reviews
  • Features
  • Editorial
  • Automotive
  • Entertainment

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.