Skip to content
  • KOSPI 2591.86 -42.84 -1.63%
  • KOSDAQ 841.91 -13.74 -1.61%
  • KOSPI200 352.58 -6.48 -1.80%
  • USD/KRW 1380 0 0%
  • JPY100/KRW 892.77 +0.23 +0.03%
  • EUR/KRW 1470.8 +1.79 +0.12%
  • CNH/KRW 190.38 -0.01 -0.01%
View Market Snapshot
Tech, Media & Telecom

Samsung SDS calls attacks on cloud biggest threat to cyber security

The South Korean ICT service provider releases its top five online dangers for 2023

By Jan 13, 2023 (Gmt+09:00)

1 Min read

Samsung SDS calls attacks on cloud biggest threat to cyber security

Cloud protection is the top cyber security concern for companies this year, a study says.

Samsung SDS Co. on Thursday said this in its report "Top Five Cyber Security Threats in 2023" covering cases of cyber security issues that occurred last year at home and abroad, cloud transformation and operation of information and communications technology.

The five dangers were threats to cloud security, user account hijacking, more advanced ransomware, attacks on vulnerable spots of software supply chains and hacking through the use of artificial intelligence (AI). 

Samsung SDS said it first diagnosed the growth of threats targeting security gaps in corporate cloud areas. Such attacks are continuing because more companies are transferring major data and infrastructure to the cloud and multi-hybrid cloud environments using two or more clouds are growingly common, it added.

Attempts to take over corporate user accounts will also increase, the report said. Hijacking an account could lead to infiltration of a company's internal network such as its cloud and other systems to gain access key information. Ransomware attacks like those that hit the cyber security industry last year will also get more frequent. Ransomware is a type of malware that infects a system, encrypts data and demands a ransom using the threat of either exposing a company's data or permanently blocking access to it.

Another forecast was growing sophistication of cyberattacks using AI technology such as hacking of vulnerable spots in software supply chains that induce installation by disguising normal files and the use of deepfakes employing advanced video and voice synthesis technology.

Write to Sungsu Bae at baebae@hankyung.com
More to Read
Comment 0
0/300