securitylinkindia

Fortinet Threat Report Reveals Record Surge in Automated Cyberattacks as Adversaries Weaponize AI & Fresh Techniques

FortiGuard Labs 2025 Global Threat Landscape Report highlights a boom in Cybercrime-as-a-Service on the darknet, fueling a lucrative market for credentials, exploits, and access Fortinet®, the global cybersecurity company driving the convergence of networking and security, recently announced the release of the 2025 Global Threat Landscape Report from FortiGuard Labs. The latest annual report is a snapshot of the active threat landscape and trends from 2024, including a comprehensive analysis across all tactics used in cyberattacks, as outlined in the MITRE ATT&CK framework. The data reveals that threat actors are increasingly harnessing automation, commoditized tools, and AI to systematically erode the traditional advantages held by defenders. “Our latest Global Threat Landscape Report makes one thing clear. Cybercriminals are accelerating their efforts, using AI and automation to operate at unprecedented speed and scale,” said Derek Manky, Chief Security Strategist and Global VP Threat Intelligence, Fortinet FortiGuard Labs, “The traditional security playbook is no longer enough. Organizations must shift to a proactive, intelligence-led defense strategy powered by AI, zero trust, and continuous threat exposure management to stay ahead of today’s rapidly evolving threat landscape.” Key findings from the latest FortiGuard Labs Global Threat Landscape Report include: ● Automated scanning hits record highs as attackers shift left to identify exposed targets early. To capitalize on newfound vulnerabilities, cybercriminals are deploying automated scanning at a global scale. Active scanning in cyberspace reached unprecedented levels in 2024, rising by 16.7% worldwide yearover- year, highlighting a sophisticated and massive collection of information on exposed digital infrastructure. FortiGuard Labs observed billions of scans each month, equating to 36,000 scans per second, revealing an intensified focus on mapping exposed services such as SIP and RDP and OT/IoT protocols like Modbus TCP. ● Darknet marketplaces fuel easy access to neatly packaged exploit kits. In 2024, cybercriminal forums increasingly operated as sophisticated marketplaces for exploit kits, with over 40,000 new vulnerabilities added to the National Vulnerability Database, a 39% rise from 2023. In addition to zero-day vulnerabilities circulating on the darknet, initial access brokers are increasingly offering corporate credentials (20%), RDP access (19%), admin panels (13%), and web shells (12%). Additionally, FortiGuard Labs observed a 500% increase in the past year in logs available from systems compromised by infostealer malware, with 1.7 billion stolen credential records shared in these underground forums. ● AI-powered cybercrime is scaling rapidly. Threat actors are harnessing AI to enhance phishing realism and evading traditional security controls, making cyberattacks more effective and difficult to detect. Tools like FraudGPT, BlackmailerV3, and ElevenLabs are fueling more scalable, believable, and effective campaigns, without the ethical restrictions of publicly available AI tools. ● Targeted attacks on critical sectors intensify. Industries such as manufacturing, healthcare, and financial services continue to experience a surge in tailored cyberattacks, with adversaries deploying sector-specific exploitations. In 2024, the most targeted sectors were manufacturing (17%), business services (11%), construction (9%), and retail (9%). Both nation-state actors and Ransomware-as-a-Service (RaaS) operators concentrated their efforts on these verticals, with the United States bearing the brunt of attacks (61%), followed by the United Kingdom (6%) and Canada (5%). ● Cloud and IoT security risks escalate. Cloud environments continue to be a top target, with adversaries exploiting persistent weaknesses such as open storage buckets, over-permissioned identities, and misconfigured services. In 70% of observed incidents, attackers gained access through logins from unfamiliar geographies, highlighting the critical role of identity monitoring in cloud defense. ● Credentials are the currency of cybercrime. In 2024, cybercriminals shared over 100 billion compromised records on underground forums, a 42% year-overyear spike, driven largely by the rise of “combo lists” containing stolen usernames, passwords, and email addresses. More than half of darknet posts involved leaked databases, enabling attackers to automate credential-stuffing attacks at scale. Well-known groups like BestCombo, BloddyMery, and ValidMail were the most active cybercriminal groups during this time and continue to lower the barrier to entry by packaging and validating these credentials, fueling a surge in account takeovers, financial fraud, and corporate espionage. CISO takeaway: Strengthening cyber defenses against emerging threats Fortinet’s Global Threat Landscape Report provides rich details on the latest attacker tactics and techniques while also delivering prescriptive recommendations and actionable insights. Designed to empower CISOs and security teams, the report offers strategies to counter threat actors before they strike, helping organizations stay ahead of emerging cyberthreats. This year’s report includes a ‘CISO Playbook for Adversary Defense’ that highlights a few strategic areas to focus on: ● Shifting from traditional threat detection to continuous threat exposure management: This proactive approach emphasizes continuous attack surface management, real-world emulation of adversary behavior, risk-based remediation prioritization, and automation of detection and defense responses. Utilizing breach and attack simulation (BAS) tools to regularly assess endpoint, network, and cloud defenses against real-world attack scenarios ensures resilience against lateral movement and exploitation. ● Simulating real-world attacks: Conduct adversary emulation exercises, red and purple teaming, and leverage MITRE ATT&CK to test defenses against threats like ransomware and espionage campaigns. ● Reducing attack surface exposure: Deploy attack surface management (ASM) tools to detect exposed assets, leaked credentials, and exploitable vulnerabilities while continuously monitoring darknet forums for emerging threats. ● Prioritizing high-risk vulnerabilities: Focus remediation efforts on vulnerabilities actively discussed by cybercrime groups, leveraging risk-based prioritization frameworks such as EPSS and CVSS for effective patch management. ● Leveraging dark web intelligence: Monitor darknet marketplaces for emerging ransomware services and track hacktivist coordination efforts to preemptively mitigate threats like DDoS and web defacement attacks. Read More

Read More
CP Plus

CP PLUS Unveils Ingenious & Inventive CTC Technology : Ushering in a New Era of Cyber-Secure Surveillance

CP PLUS, India’s leading security and surveillance brand, has officially launched its groundbreaking CTC Technology – CP PLUS Trusted Core Technology. Engineered with precision, foresight, and the promise of secure innovation, this ingenious and inventive solution addresses the growing global concern over data privacy and cybersecurity in modern surveillance systems. As the world advances toward hyper- connected environments, with smart homes, cloud platforms, and IoT-based systems becoming the norm, the vulnerabilities that come along with these conveniences have increased manifold. Recognizing this crucial shift, CP PLUS has developed CTC Technology as the heart of reliable, resilient, and secure surveillance: designed to fortify every layer of the surveillance ecosystem. CTC Technology is a multi-layered security architecture that brings together the best of cybersecurity practices and technological intelligence. It is not just an enhancement; it is a complete redefinition of how surveillance should function in today’s digital landscape – more intelligent, more secure, and more reliable than ever before. “At its core, CTC stands for CP PLUS Trusted Core Technology, a proprietary advancement developed with one clear mission: to protect surveillance systems from modern cyber threats that are constantly evolving. It safeguards users by addressing all possible touchpoints of vulnerability, including data access, device firmware, system operations, network communication, and even the origin of hardware components. It ensures that every camera, every stream, every piece of footage – and every byte of data – is protected,” added Aditya Khemka, Managing Director, CP PLUS (Aditya Infotech Ltd.). What sets CTC apart is its foundation on six critical pillars of protection, each addressing a key vulnerability area. Cyber Security protects the system from hacking attempts and unauthorized access. Operational Security ensures there are no disruptions or system failures caused by malicious interference. Network Security shields data transmission channels to prevent breaches. Data Security secures all recorded footage using high-grade encryption, making it unreadable to unauthorized users. Application Security ensures that the software running the devices is robust and shielded against exploits. And lastly, Critical Component Security safeguards the hardware and firmware – the physical and digital backbone of every device – from tampering or counterfeiting. CP PLUS, India’s leading security and surveillance brand, has officially launched its groundbreaking CTC Technology – CP PLUS Trusted Core Technology. Engineered with precision, foresight, and the promise of secure innovation, this ingenious and inventive solution addresses the growing global concern over data privacy and cybersecurity in modern surveillance systems But CTC doesn’t stop there. It incorporates a host of advanced security measures, making it one of the most comprehensive surveillance security platforms available today. 1. Enterprise-Grade Security CTC ensures your surveillance system starts securely and stays protected with the latest encryption and authentication mechanisms. 2. Secure Boot: Verified from Power– On CTC verifies firmware integrity from the moment the device powers on – no chance for malicious code injection. 3. Strong Cryptography with AES- 256 CTC employs the latest AES-256 encryption standard, safeguarding data transmission and storage at all times. 4. Tamper-Proof Communication CTC secures all data in transit with encrypted channels, ensuring protection against man-in-the-middle attacks. 5. Trusted Core = Trusted Surveillance CTC builds trust at the core, enabling organizations to meet compliance needs like OWASP, IoTSCS ER, and more. The system is also resilient against side-channel attacks, a sophisticated form of cyberattack that exploits indirect leaks like electromagnetic emissions or power consumption. CTC has been specifically engineered to resist such vulnerabilities with advanced hardware-level security. Backing the technological depth of CTC is a stamp of validation that speaks volumes. Our CTC-powered cameras are STQC Certified, aligning with India’s stringent cybersecurity and quality assurance standards. This certification reinforces the credibility and reliability of CTC-enabled solutions and showcases CP PLUS’s dedication to developing indigenized, Made-in-Bharat innovations that meet global benchmarks. In simpler terms, CTC Technology ensures that your surveillance system is protected: always. Whether it is the camera you have installed in your home, a large-scale deployment in a city surveillance project, or critical systems in financial, healthcare, or industrial sectors, CTC ensures that your data remains your own and your systems remain resilient against all cyber threats. At its core, CTC stands for CP PLUS Trusted Core Technology, a proprietary advancement developed with one clear mission: to protect surveillance systems from modern cyber threats that are constantly evolving. It safeguards users by addressing all possible touchpoints of vulnerability, including data access, device firmware, system operations, network communication, and even the origin of hardware components. It ensures that every camera, every stream, every piece of footage – and every byte of data – is protected Aditya KhemkaManaging Director,CP PLUS (Aditya Infotech Ltd.). With this launch, CP PLUS has once again demonstrated its ability to lead the industry not just in innovation, but in responsible and secure innovation. CTC Technology is not just a new feature, it is a new philosophy, one that believes surveillance should be about more than just watching; it should be about protecting, not just physical spaces, but digital sanctity too. The future of secure surveillance is here. Its name is CTC. And it is proudly brought to you by CP PLUS. Read More

Read More