1、CYBER SECURITYREPORT20242CHECK POINT SOFTWARE|SECURITY REPORT 2024YOU D E S E R V E THE BE S T SECURIT Y3CHECK POINT SOFTWARE|SECURITY REPORT 2024CHAPTER 1 INTRODUCTION TO THE 2024 CYBER SECURITY REPORT BY MAYA HOROWITZ,VP RESEARCHCHAPTER 2 TIME LINE OF NOTABLE 2023 CYBER EVENTSCHAPTER 3 CYBER SECUR
2、ITY TRENDS26 Ransomware Zero-days and Mega Attacks30 Expanding Attack Surface:The Emerging Risk of Edge Devices34State-AffiliatedHacktivismandWipersBecometheNewNormal38TokensunderAttack:TheCloudsAchillesHeel41PIPInstallMalware:SoftwareRepositoriesUnderAttackCHAPTER 4 GLOBAL ANALYSIS CHAPTER 5 HIGH P
3、ROFILE GLOBAL VULNERABILITIESCHAPTER 6 CHECK POINT INCIDENT RESPONSE PERSPECTIVECHAPTER 7 INSIGHTS FOR CISOSPREDICTIONS CHAPTER 8 AI:THE CUTTING-EDGE DEFENDER IN TODAYS CYBERSECURITY BATTLESCHAPTER 9 MALWARE FAMILY DESCRIPTIONSCHAPTER 10 CONCLUSION040725467075818593101C O N T E N T S4CHECK POINT SOF
4、TWARE|SECURITY REPORT 202410INTRODUCTION TO THE 2024 CYBER SECURITY REPORTCH A P TER 1MAYA HOROWITZ VP Research,Check Point5CHECK POINT SOFTWARE|SECURITY REPORT 2024Welcome to the Check Point 2024 Cyber Security Report.In 2023,the world of cyber security witnessed significant changes,with the nature
5、 and scale of cyber attacks evolving rapidly.This year,we saw cyber threats stepping out from the shadows of the online world into the spotlight,grabbing the attention of everyone from government agencies to the general public.The reasons behind these attacks have become as varied as the methods use
6、d.Ransomware remained a major threat,with attackers not just after money,but also seeking recognition.Ransomware attacks exploiting zero-day vulnerabilities while using shame sites for publicly revealing who their victims are became more popular,turning ransomware into a sort of competition among cy