{"id":16190,"date":"2024-07-22T06:00:32","date_gmt":"2024-07-22T06:00:32","guid":{"rendered":"https:\/\/letslaw.es\/?p=16190"},"modified":"2024-07-04T10:04:35","modified_gmt":"2024-07-04T10:04:35","slug":"trendy-cyberattacks","status":"publish","type":"post","link":"https:\/\/letslaw.es\/en\/trendy-cyberattacks\/","title":{"rendered":"Trendy Cyberattacks: what to do to avoid them?"},"content":{"rendered":"<h2><span style=\"font-weight: 400;\">Current Landscape<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">In the first half of this year, we have seen how the landscape has changed with cyberattacks on companies, as <\/span><b>significant security incidents have been reported to companies in different sectors almost weekly<\/b><span style=\"font-weight: 400;\">. According to a report by Cybersecurity Ventures, in 2023, there was an attack every 39 seconds, amounting to more than 2,200 per day. In another study on this issue, the European Union estimated the global annual cost of cybercrime at over 5 trillion euros.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Various reports indicate that technology and service companies are the primary victims of cybercriminals, representing 32% of the attacks. Among these, companies in the communication sector stand out, including media and advertising firms as well as those dedicated to telecommunications services. Therefore, companies today face a cybersecurity threat landscape that is periodically updated, especially with the recent introduction of Artificial Intelligence, underscoring the need to adopt and implement adaptive cybersecurity strategies.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Trendy Cyberattacks<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">In recent months, we have observed that as new vulnerabilities, attack vectors, and malware variants emerge, the threats evolve. Among the threats that companies have most suffered in recent months of 2024 are:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Ransomware<\/b><span style=\"font-weight: 400;\">: This type of malware prevents users from accessing their system or files and demands a ransom to recover and regain access to all their data. It can develop from the implementation of fake security programs, computer screen blockers, or those that encrypt data. In 2024, Europe detected 24% of the world&#8217;s ransomware attacks, with the communication sector being the most affected, experiencing a 177% increase in attacks.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Supply Chain Attacks<\/b><span style=\"font-weight: 400;\">: A supply chain attack (also known as a third-party attack or value chain attack) occurs when a cybercriminal gains access to a company&#8217;s work network through its suppliers or supply chain. These attacks are often directed at the source code of an application, making them more challenging to detect.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Multivector Attacks<\/b><span style=\"font-weight: 400;\">: These are sophisticated cyberattacks that use multiple methods to gain access to an organization&#8217;s systems. Multivector attacks often require more resources and sophistication than single-vector attacks but offer a higher probability of success.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Use of AI in Cyberattacks<\/b><span style=\"font-weight: 400;\">: With the widespread deployment of AI in society, it has been observed that these tools are used as threat actors to streamline and enhance security attacks.<\/span><\/li>\n<\/ul>\n<h2>\u00a0Tips to Avoid Cyberattacks<\/h2>\n<p><span style=\"font-weight: 400;\">With the increase in digitalization in companies, the risks have also risen, so many companies should review their cybersecurity measures and plans comprehensively and strategically. These measures could include: conducting robust backups of company data, encrypting systems, training employees on cybersecurity, increasing the training and updating of company resources around preventive measures, security protocols, greater investment in technological infrastructure, increasing security patches, implementing user authentication measures and achieved solutions, and even designing a cyber threat response plan to protect remote work environments and their digital resources, with all these being key points to consider.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Mainly, <\/span><b>it is important for companies to update their cybersecurity measures and bear in mind that the more these cyberattacks advance<\/b><span style=\"font-weight: 400;\">, the more their defense techniques must advance, especially those related to the early detection and analysis of anomalies and new attack patterns, particularly in AI.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Therefore, in light of this new legal uncertainty, Letslaw is at your disposal to resolve any doubts that may arise, help you implement these measures and infrastructure, and review those you already have in place as <\/span><a title=\"Cybersecurity lawyers\" href=\"https:\/\/letslaw.es\/en\/abogados-corporate-compliance\/ciberseguridad\/\"><span style=\"font-weight: 400;\">cybersecurity lawyers<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<div class=\"cyp_post_formulario\"><h2>Contact Us<\/h2>\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f3074-o1\" lang=\"es-ES\" dir=\"ltr\" data-wpcf7-id=\"3074\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/posts\/16190#wpcf7-f3074-o1\" method=\"post\" class=\"wpcf7-form init wpcf7-acceptance-as-validation\" aria-label=\"Formulario de contacto\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"3074\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"es_ES\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f3074-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/fieldset>\n<div class=\"campo_nombre\" style=\"width:100%\"> <span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required datos-contacto2\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Name\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span><\/div>\n<div class=\"campo_telefono\" style=\"width:100%\"> <span class=\"wpcf7-form-control-wrap\" data-name=\"your-phone\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel datos-contacto2\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Phone\" value=\"\" type=\"tel\" name=\"your-phone\" \/><\/span><\/div>\n<div class=\"campo_email\" style=\"width:100%\"> <span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email datos-contacto2\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Email\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span><\/div>\n<div class=\"campo_asunto\" style=\"width:100%\"> <span class=\"wpcf7-form-control-wrap\" data-name=\"your-asunto\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required datos-contacto2\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Subject\" value=\"\" type=\"text\" name=\"your-asunto\" \/><\/span><\/div>\n<div class=\"campo_mensaje\" style=\"width:100%\"> <span class=\"wpcf7-form-control-wrap\" data-name=\"your-mensaje\"><textarea cols=\"40\" rows=\"10\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea wpcf7-validates-as-required datos-contacto2\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Message\" name=\"your-mensaje\"><\/textarea><\/span><\/div>\n<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"\" type=\"hidden\" name=\"cyp_form_url\" \/>\n<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"cyp_zonaweb\" type=\"hidden\" name=\"zonaweb\" \/>\n<span class=\"wpcf7-form-control-wrap recaptcha\" data-name=\"recaptcha\"><span data-sitekey=\"6LfbCuUpAAAAAGu5f0__hms_y9Kscc_NCNdDGnEJ\" class=\"wpcf7-form-control wpcf7-recaptcha g-recaptcha\"><\/span>\r\n<noscript>\r\n\t<div class=\"grecaptcha-noscript\">\r\n\t\t<iframe loading=\"lazy\" src=\"https:\/\/www.google.com\/recaptcha\/api\/fallback?k=6LfbCuUpAAAAAGu5f0__hms_y9Kscc_NCNdDGnEJ\" frameborder=\"0\" scrolling=\"no\" width=\"310\" height=\"430\">\r\n\t\t<\/iframe>\r\n\t\t<textarea name=\"g-recaptcha-response\" rows=\"3\" cols=\"40\" placeholder=\"Aqu\u00ed la respuesta de reCAPTCHA\">\r\n\t\t<\/textarea>\r\n\t<\/div>\r\n<\/noscript>\r\n<\/span>\n<div style=\"width:100%\">\n<p class=\"form-input-check\" style=\"color:#444444 !important;padding:0px !important;margin:0px !important;font-size:12px !important;margin-bottom:15px !important\">\nBy clicking on \"Send\" you accept our <a href=\"https:\/\/letslaw.es\/en\/privacy-policy\/\" target=\"_blank\">Privacy Policy<\/a> - <a href=\"javascript:\/\/\" class=\"cyp_legal_popup_ingles\">+ Info<\/a>\n<\/p>\n<p class=\"form-input-check\" style=\"color:#444444 !important;padding:0px !important;margin:0px !important;font-size:12px !important\">\n<span class=\"wpcf7-form-control-wrap\" data-name=\"checkbox-173\"><span class=\"wpcf7-form-control wpcf7-checkbox wpcf7-exclusive-checkbox\"><span class=\"wpcf7-list-item first last\"><label><input type=\"checkbox\" name=\"checkbox-173\" value=\"\" \/><span class=\"wpcf7-list-item-label\"><\/span><\/label><\/span><\/span><\/span> I agree to receive outlined commercial communications from LETSLAW, S.L. in accordance with the provisions of our <a href=\"https:\/\/letslaw.es\/en\/privacy-policy\/\" target=\"_blank\">Privacy Policy<\/a> - <a href=\"javascript:\/\/\" class=\"cyp_legal_popup\">+ Info<\/a>\n<\/p>\n<\/div>\n<div class=\"vc_col-sm-12 botton-datos-contacto\"><input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Send\" \/><\/div><input type='hidden' class='wpcf7-pum' value='{\"closepopup\":false,\"closedelay\":0,\"openpopup\":false,\"openpopup_id\":0}' \/><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n<div>","protected":false},"excerpt":{"rendered":"<p>Significant security incidents have been reported to companies in different sectors almost weekly. <\/p>\n","protected":false},"author":67,"featured_media":16189,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[258],"tags":[],"class_list":["post-16190","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digital-law"],"_links":{"self":[{"href":"https:\/\/letslaw.es\/en\/wp-json\/wp\/v2\/posts\/16190","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/letslaw.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/letslaw.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/letslaw.es\/en\/wp-json\/wp\/v2\/users\/67"}],"replies":[{"embeddable":true,"href":"https:\/\/letslaw.es\/en\/wp-json\/wp\/v2\/comments?post=16190"}],"version-history":[{"count":4,"href":"https:\/\/letslaw.es\/en\/wp-json\/wp\/v2\/posts\/16190\/revisions"}],"predecessor-version":[{"id":16191,"href":"https:\/\/letslaw.es\/en\/wp-json\/wp\/v2\/posts\/16190\/revisions\/16191"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/letslaw.es\/en\/wp-json\/wp\/v2\/media\/16189"}],"wp:attachment":[{"href":"https:\/\/letslaw.es\/en\/wp-json\/wp\/v2\/media?parent=16190"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/letslaw.es\/en\/wp-json\/wp\/v2\/categories?post=16190"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/letslaw.es\/en\/wp-json\/wp\/v2\/tags?post=16190"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}