• Latest
  • All
  • How To
Contrary to Popular Belief, Linux Sytems Are Now Receiving Their Fair Share of Cyberattacks

Contrary to Popular Belief, Linux Sytems Are Now Receiving Their Fair Share of Cyberattacks

October 28, 2022
Infinix Note 50 Pro x Java House Collab

Infinix Teams Up with Java House to Launch Note 50 Pro Series

July 4, 2025
Instagram threads

Instagram Threads Rolls Out Direct Messaging in Major Feature Update

July 4, 2025
Infinix Hot 60i Pre-order

Infinix Hot 60i Now Available for Pre-Order in Kenya

July 4, 2025
Windows

Microsoft’s Windows Usage Slumps as Macs, Linux, and Mobile Take Over

July 4, 2025
DHgate Tablet Cases deals
Microsoft

Microsoft Slashes 9,100 Jobs in Biggest Layoffs Since 2023

July 4, 2025
NASA

NASA Brings Space Missions to Netflix at No Extra Cost

July 3, 2025
ios 26-facetime

iOS 26 May Pause Video if You Start Undressing on FaceTime

July 3, 2025
apple iphone foldable

Apple Begins Testing Its First Foldable iPhone

July 3, 2025
Mobile Data

Kenya Draws More Tourists as Mobile Data Roaming Soars

July 3, 2025
Axian Telecom Considers Full Acquisition of Jumia

Axian Telecom Is Plotting a Full Buyout of Jumia

July 3, 2025
Cable TV

Kenya’s Cable TV Market Rebounds with 31.5% Growth

July 3, 2025
Premier League and Microsoft Announce Strategic AI Partnership for Enhanced Fan Engagement

Football Meets AI as Microsoft Joins Forces with the EPL

July 3, 2025
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
No Result
View All Result

Contrary to Popular Belief, Linux Sytems Are Now Receiving Their Fair Share of Cyberattacks

Kenn Abuya by Kenn Abuya
October 28, 2022
in News
Reading Time: 3 mins read
251
0

What happened over the period the COVID-19 pandemic started and when it reached its peak? Well, more people went online for work, school, entertainment, and more. To this end, it has been reported that over 73% of Information Technology security decision-makers are concerned about the growing digital attack space.

 A report released by Trend Micro has revealed several interesting trends and developments within the cybersecurity space. The continued growth of threat detections, which has increased exponentially since the pandemic forced greater adoption of digital functions, is one key finding.

The report states that many IT decision-makers are concerned about the rapid digitalization, with 43% claiming that the digital attack surface is spiraling out of control and 37% describing it as constantly evolving and messy.

“In light of the challenges faced by IT professionals, it is clear that there is a need for improved investment and understanding of the cyber-attack landscape,” the report says in part.

READ MORE: Retail Industry Second Most Targeted Industry by Ransomware in 2021

Additional highlights in the report include the following:

  • While new malware tends to receive the lion’s share of the spotlight, the first half of 2022 saw a significant resurgence of old favourite commodity malware, Emotet. Despite its infrastructure being taken down in 2021, the report showed detections of the botnet increased from 13,811 in H1 2021 to 148,701 in H1 2022. 
  • Cyber warfare is a growing trend with prominent groups launching attacks on Ukrainian targets before and during the conflict with Russia. In addition to this, other threat actors are targeting individuals outside of the conflict, capitalizing on curiosity and sympathy. Turning their attention away from dwindling interest in Covid-19, many are now using requests for donations as a guise for their spam emails. According to a recent report from Interpol, online scams through text messages and email top the list of most prominent threats in Africa. This is supported by Trend Micro’s regional statistics for H1 2022, which show well over 2.4 million blocked mails in the region. 
  • Ransomware as a service (RaaS) continues to grow as a threat with LockBit, Conti, and BlackCat at the helm. This profitable approach to cybercrime allows would-be cybercriminals to access tools and infrastructure that otherwise would not have been available to them. The RaaS system places the responsibility of infection on affiliates, providing developers with a layer of protection and additional time in which to evolve their malware. The growing popularity of this approach is largely responsible for the 2.5 million detections worldwide, of which nearly 200,000 occurred in Africa. 

READ MORE: After 2017’s WannaCry Attacks, Ransomware is Still the Number One Online Threat

  • Linux systems have become an attractive option for malicious actors looking to concentrate on servers and embedded systems, both areas where Linux is expected to see growth in the next few years. The new focus on the operating system became clear in H1 2022 which saw a 75% increase in ransomware attacks targeting Linux machines. This emerging trend is concerning to organizations as targeted infrastructure forms part of their critical infrastructure and successful attacks have the potential to deal significant damage. 
  • As investment in Cloud Computing in Africa continues to grow, new security challenges are emerging. Top of this list are cloud tunneling and containers. While cloud tunneling allows users to swiftly deploy assets and services – it can also prevent full visibility of the deployed assets. Trend Micro found attackers are taking advantage of this by launching attacks in unconventional places where IT teams tend not to look. Similarly, containers offer organizations increased speed and efficiency in their development cycles. However, many have failed to implement proper security controls, which can lead to compromise at various stages of the pipeline. Misconfigured container software remained a top concern in H1 2022 with 53% of respondents in a recent Red Hat survey reporting misconfiguration detection on their containers. 

Quote

“Although most detections and attacks are still aimed overseas, it is crucial that Africa invest in improved security measures. A critical part of this investment must be focused on resolving the skills shortage. While a comprehensive security solution like Trend Micro One can provide your systems with protection, skills development programs will play a key role in ensuring a safe future,” says Emmanuel Tzingakis, technical lead of sub-Saharan Africa.

Tags: CybersecurityLinux
SendShare147Tweet92
Kenn Abuya

Kenn Abuya

Kenn Abuya is a friend of technology, with bias in enterprise and mobile tech. Share your thoughts, tips and hate mail at [email protected]

Related Posts

DeepSeek_vs_ChatGPT

Hackers Build Malware That Tries to Reprogram AI Security Tools

July 1, 2025
tackling Bank Fraud, Sextortion, and Ransomware in Kenya

Kenya Facing Rise in Cyberthreats from Bank Fraud, Sextortion, and Ransomware

July 1, 2025
Kenya cyber threats 2025

Kenya Detects Over 2.5 Billion Cyber Threats in Three Months

June 30, 2025
Iran cyberattacks

Cyber Attacks Soar After US Airstrikes on Iran Sites

June 27, 2025
How to Secure Your Phone and Yourself During Protests

How to Secure Your Phone (and Yourself) During Protests

June 25, 2025
google-chrome

Three Billion Chrome Browser Users at Risk from Zero Day Hack

June 3, 2025

Latest

Infinix Note 50 Pro x Java House Collab

Infinix Teams Up with Java House to Launch Note 50 Pro Series

July 4, 2025
Instagram threads

Instagram Threads Rolls Out Direct Messaging in Major Feature Update

July 4, 2025
Infinix Hot 60i Pre-order

Infinix Hot 60i Now Available for Pre-Order in Kenya

July 4, 2025
Windows

Microsoft’s Windows Usage Slumps as Macs, Linux, and Mobile Take Over

July 4, 2025
Microsoft

Microsoft Slashes 9,100 Jobs in Biggest Layoffs Since 2023

July 4, 2025
NASA

NASA Brings Space Missions to Netflix at No Extra Cost

July 3, 2025

Best devices

budget smartwatches 2025

Best Budget Smartwatches To Buy in Kenya 2025

February 13, 2025

Best Infinix Smartphones To Buy in Kenya 2024

February 13, 2025

Best Laptops for Battery Life in 2024

August 21, 2024

Best “Battery Warrior” Smartphones To Buy in 2024

August 22, 2024

Infinix Teams Up with Java House to Launch Note 50 Pro Series

July 4, 2025

Instagram Threads Rolls Out Direct Messaging in Major Feature Update

July 4, 2025

Techweez is a fast growing influential source of technology news, reviews and analysis by leading tech geeks in the industry.

Follow Us

Editorials

Abductions and Arrests! Kenyan Government’s Fear and Hate of X Users Makes No Sense

Actors and Film Crews Are Worried About Veo 3 Taking Their Jobs

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

Trump’s Tariffs Will Be the End of Affordable Tech

5 Ways to Prep Your Tech for Resale

The Weaponization of PDFs: How Cybercriminals Are Exploiting a Trusted Format

More News

iOS 26 May Pause Video if You Start Undressing on FaceTime

Apple Begins Testing Its First Foldable iPhone

Kenya Draws More Tourists as Mobile Data Roaming Soars

Axian Telecom Is Plotting a Full Buyout of Jumia

Kenya’s Cable TV Market Rebounds with 31.5% Growth

Football Meets AI as Microsoft Joins Forces with the EPL

  • Terms Of Use
  • Techweez Brand
  • Privacy & Policy
  • Contact Us

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!

Hey there! Just a heads-up: we're big fans of cookies - both the digital and edible kind! 🍪 We use our cookies and some from third parties to ensure your browsing experience on our site is smooth sailing and secure.

 

But wait, there's more! We also use cookies to gather stats and insights on how you navigate our site. It's like getting a behind-the-scenes peek at your digital adventures!

 

Don't worry, you're in control. You can adjust your cookie settings anytime to suit your preferences. Feeling curious? Dive into our Privacy Policy for all the juicy details. Happy browsing! 🚀

Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
No Result
View All Result
  • News
  • Reviews
  • Features
  • Editorial
  • Automotive
  • Entertainment

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.