5 Top Cybersecurity Attacks Revealed at RSAC2018

YouTube Video of the discussions of the following people:

Alan Paller, Moderator, Research Director and Founder, SANS Institute Ed Skoudis, Faculty Fellow, Penetration Testing

The following image shows the most interesting points brought forward in the video, as this is a presentation at RSAC every year now with SANS’ top instructors or employees that work throughout their company. Dr. Johannes Ulrich is at Internet Storm Center many days(although others keep it going when he is not available).

Top Cyber attacks to look for this year:

  1. Cloud Storage leakage
  2. Big Data Analaytics
  3. Crypto Currency mining on your infrastructure
  4. ICS/SCADA  will get some attention from hackers
  5. IoS will continue to be attacked and used for hacker purposes

These possible attack vectors are not surprises really, but it is good to reinforce where we need to focus.

Cloud storage can be a problem when not configured with security in mind. Have you done an audit with  your data?  Considered if private repositories were marked public? Public repositories with sensitive data? Github, Amazon, Google cloud, Microsoft Azure, Docker Hub and more each have their own pitfalls.

When you collaborate within the cloud is the software written within the cloud written with security in mind?  We know that some chips cannot keep all data within the bounds as we expect without a patch.  This information was found after the software was out in the world for years. New cloud security problems are being investigated now.

Big Data Analytics

Now the criminals are using the data that they have already stolen in new ways…  Maybe they fill out your new credit card with all info about you(as if it was you).  Also could fill out a completed tax form with 90% accuracy.    So it is possible that new methods are being devised where data is being found on you to help create better scams or general criminal enterprises.

Data is not important, criminal hackers want your computer resources to run crypto currencies.

Finally, the ICS/SCADA cyber problem is going to just get going. The problem in SCADA is that people will likely get hurt.  The problem in this space is that the ICS (Industrial Control Systems) space is not as secure as other systems have been due to a lack of focus on security.

Of course the IoT(Internet of Things item is also an important attack area. If you think about it the criminals will come up with new ways of attacking our infrastructure and will try and find any method that is possible. So if you are not focusing on an area, or it has not had a Cyber focus in the past… then it will be found sooner than later.


It is true, the hackers are trying to get the low hanging fruit, but we need to circle the wagons, and review everything again and again.

The simple thing to do is to audit your systems with a framework of audit work such as in CISA (Certified Information Systems Auditor).

Lucky we have this CISA certification –

Contact Us

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.