Friday, 20 Mar 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Global Market > 6 key mobile and IoT/OT attack trend findings
Global Market

6 key mobile and IoT/OT attack trend findings

Last updated: October 19, 2024 5:35 am
Published October 19, 2024
Share
6 key mobile and IoT/OT attack trend findings
SHARE

The position of the CISO continues to develop, pushed by the rising variety of breaches and cyberattacks like ransomware, in addition to SEC necessities for public organizations to reveal materials breaches.

Among the many fastest-moving frontiers in enterprise cybersecurity: cellular, the web of issues (IoT), and operational expertise (OT) programs. As we speak, 96.5% of individuals entry the web with a cellular gadget, whereas 59% of web site visitors is generated by cellular units. In the meantime, OT and cyber-physical programs, as soon as air-gapped and remoted from the web, have quickly turn out to be built-in into enterprise networks, the place threats can proliferate.

To make clear this burgeoning menace panorama, the Zscaler ThreatLabz analysis staff carried out an in depth evaluation of cellular and IoT/OT assault traits from June 2023 to Might 2024.

Total, ThreatLabz tracked an increase in financially motivated cellular assaults – with 111% progress in adware and 29% progress in banking malware – most of which might bypass multifactor authentication (MFA). In the meantime, IoT assaults grew 45% year-over-year, and ThreatLabz recognized pervasive safety dangers in OT environments.

Under, we’ll summarize key findings from the report. For a complete understanding of cellular and IoT/OT traits, case research, and greatest practices to safe your group, obtain the Zscaler ThreatLabz 2024 Mobile, IoT, and OT Threat Report.

Prime Cellular and IoT/OT traits

  1. Rise in financially-motivated cellular threats, together with a 111% rise in adware and 29% progress in banking malware.
    • Regardless of an general lower in Android assaults, financially-motivated cellular threats are rising, with the bulk in a position to bypass MFA.
  2. IoT assaults elevated by 45% primarily based on blocked makes an attempt within the Zscaler cloud in comparison with our 2023 report.
    • Zscaler blocked 45% extra IoT malware transactions than the earlier 12 months. ThreatLabz additionally noticed a 12% rise within the variety of makes an attempt to ship malware (payload deliveries) to IoT units.
  3. ThreatLabz found 200+ pretend apps on the Google Play Retailer.
    • This contains Anatsa, a recognized Android banking malware that has focused greater than 650 monetary establishments through the use of PDF and QR code readers to distribute itself.
  4. Legacy and end-of-life working programs (OS) go away OT programs weak.
    • Previousy air-gapped and remoted from the web, OT and cyber-physical programs are quickly turning into built-in into enterprise networks, enabling threats to proliferate.
    • In an evaluation of large-scale OT deployments ThreatLabz discovered 50% or extra of OT programs use an end-of-life OS, many with recognized vulnerabilities. In the meantime, dangerous protocols and companies in east-west OT site visitors abound.
See also  Caroline O’Connor (Zayo Europe) - HostingJournalist.com

Prime cellular and IoT/OT targets

5. India was the highest goal for cellular assaults, experiencing 28% of all assaults, adopted by the US, Canada, South Africa, and the Netherlands. America stays the highest goal of IoT assaults, experiencing 81% of all assaults, adopted by Singapore, the UK, Germany, and Canada.

Zscaler

6. Manufacturing skilled the best quantity of IoT assaults, accounting for 36% of all IoT malware blocks noticed, adopted by transportation (14%) and meals, beverage & tobacco (11%). The expertise and training sectors have been most focused by cellular threats.

Zscaler

Securing cellular, IoT, and OT with zero belief

As cyberattacks that focus on cellular and IoT/OT property turn out to be extra subtle, enterprises want a option to cut back cyber threat whereas embracing IoT and OT connectivity to drive enterprise. Certainly, not solely are IoT assaults rising, however menace actors are actively focusing on OT units and demanding infrastructure, about which CISA has warned. In the meantime, enterprises want a option to robustly safe cellular connectivity to any SaaS or non-public software, whether or not within the cloud or within the information heart. To guard these units and programs, enterprises ought to undertake a zero belief method that mitigates cyberthreats and improves their safety posture:

  • Uncover, classify, and stock IoT and OT property: Work to achieve full visibility into your IoT and OT assault floor; this contains discovering, classifying, and inventorying each managed and unmanaged or “shadow” units. With this type of holistic view, defenders can prioritize their efforts, determine key vulnerabilities, and develop a proactive method to securing these property.
  • Allow zero belief connectivity: Leverage a sturdy zero belief structure that permits adaptive entry choices primarily based on the real-time safety and posture of consumer units, threat components, and gadget telemetry, making certain safe direct connectivity between endpoints and purposes – by no means to the underlying community.
  • Implement zero belief gadget segmentation: Apply least-privileged entry controls for device-to-application, user-to-application, and application-to-application segmentation. This granular degree of segmentation eliminates lateral motion, minimizes information publicity, and strengthens your general safety posture by decreasing the potential for a single compromised gadget to jeopardize all the community. This could embrace isolating and totally segmenting agentless IoT/OT units right into a safe “community of 1,” together with legacy servers and headless machines.
  • Keep constant zero belief safety insurance policies: Make sure that zero belief entry insurance policies are constantly enforced throughout all environments, whether or not customers are at headquarters, model places, or accessing purposes remotely.
See also  Soaring memory prices dampen sentiment as AI swallows output

As cellular and IoT/OT threats proliferate, it’s vital to grasp the newest traits, the implications of those sorts of assaults, and the best-practice methods you’ll be able to undertake to safe your group in opposition to a full vary of threats.

Get your copy of the Zscaler ThreatLabz 2024 Mobile, IoT, and OT Threat Report right this moment.

Source link

TAGGED: attack, findings, IoTOT, Key, Mobile, Trend
Share This Article
Twitter Email Copy Link Print
Previous Article AI meets blockchain and decentralised data AI meets blockchain and decentralised data
Next Article Meta Introduces Spirit LM open source model that combines text and speech inputs/outputs Meta Introduces Spirit LM open source model that combines text and speech inputs/outputs
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Nortian Raises $41M in Funding

Nortian, a Kansas Metropolis, KS-based biotech firm, raised $41M in funding, at $100M valuation. The…

May 14, 2025

New figures show record investment in British AI companies

New figures present that backing for British AI firms reached report ranges final 12 months,…

September 4, 2025

The #SEOUpdateByYoast: Summer 2024

Be part of the newest web optimization insights with #SEOUpdateByYoast. Hosted by Florie van Hummel,…

August 7, 2024

AI’s fourth wave is here — are enterprises ready for what’s next?

Yesterday’s rising tech is now important to enterprise success — and the following wave is…

July 14, 2025

Data Center News Roundup: An End to Switching Fees | DCN

With information heart information shifting sooner than ever, we need to make it simple for…

March 8, 2024

You Might Also Like

Nvidia GTC 2026 Vera Rubin
Global Market

Nvidia overhauls the data center for OpenClaw era

By saad
Antin Infrastructure Partners completes takeover of NorthC
Global Market

Antin Infrastructure Partners completes takeover of NorthC

By saad
Cloud Computing Disaster Recovery Solutions Concept - Cloud DR - Services Companies Use for the Purpose of Backing Up Resources into a Cloud Environment - 3D Illustration
Global Market

Nile adds microsegmentation and native NAC to its secure NaaS platform

By saad
Planning delays continue to delay Tritax's Slough data centre
Global Market

Planning delays continue to delay Tritax’s Slough data centre

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.