Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

Top eight cybersecurity predictions for 2022

By Derek Manky
cyber-security-freepik1170x658x6.jpg
March 14, 2022

Cybercriminals are spreading their wings to explore new opportunities, from new kinds of ransomware to artificial intelligence (AI)-based deep fakes and more. They’re also finding new opportunities in established systems like Linux and operational technology (OT). In the spirit of proactive strategy, let’s look at the eight predictions that are likely to have the biggest impact on networks in the coming year and why they are so important to prepare for.



1: Cybercriminals using deep fakes

Deep fakes have become a concern because they use AI to mimic human activities and can be used to enhance social engineering attacks. The continued commercialization of advanced applications lowers the bar for creating deep fakes. These could eventually lead to real-time impersonations over voice and video applications that cybercriminals could use to pass biometric analysis. That will be a significant challenge for secure forms of authentication like voiceprints or facial recognition.


2: Attacks on enterprise digital wallets

Digital wallets tend to be less secure than wire transfers, so bad actors are increasingly turning their sights on them. Though individual wallets may not equate to a big payoff, the use of these wallets by businesses as currency for online transactions very well could. Consequently, more malware is likely to be designed specifically to target stored credentials and to empty digital wallets.


3: Ransomware becomes more destructive

Because it’s still so lucrative, ransomware will persist. Attackers sometimes combine ransomware with distributed denial-of-service (DDoS) with the intention of overwhelming IT security teams. If they add Wiper malware, it creates added urgency for companies to quickly cave to ransom demands. This type of malware is particularly insidious because it could not only wreck data but destroy systems and hardware — as criminals tried to do at the Olympic Games in Tokyo. It’s only a matter of time until destructive capabilities like Wiper malware are added to ransomware toolkits.


4: Threats from space 

As satellite-based internet access continues to grow in the coming year, FortiGuard Labs predicts new proof-of-concept (POC) threats targeting satellite networks. Enterprises that rely on satellite-based connectivity to support low-latency activities — like online gaming or delivering critical services to remote locations, as well as remote field offices, pipelines, or cruises and airlines — will be the primary targets. Further attack surface expansion is likely as organizations add satellite networks to connect previously off-grid systems, such as remote OT devices, to their interconnected networks. Attack types such as ransomware are likely to follow in the wake of this new activity.


5: It’s game on for esports

Esports is a thriving sector that’s likely to surpass $1 billion in revenue this year. This term refers to organized, multiplayer video gaming competitions, often involving professional players and teams. Unfortunately, they’re becoming a more enticing target for malicious actors for two primary reasons. First, esports requires constant connectivity. Second, players are interacting from inconsistently secured home networks or in situations with large amounts of open Wi-Fi access. Because gaming is so interactive in nature, it is also a target for social engineering lures and attacks. Its rate of growth makes online gaming a likely and significant attack target next year.


6: Living on the edge (but not like Aerosmith)

A new kind of threat is arising at the edge. Living-off-the-land attacks effectively use legitimate tools to execute criminal activities. If attackers combine these attacks with Edge-Access Trojans (EATs), they could design new attacks to live off the edge, not just the land, as edge devices become more powerful — which becomes particularly dangerous as these devices offer more native capabilities and more privilege. Edge malware could be designed to monitor edge activities and data and then steal, hijack or even ransom critical systems, applications and information while escaping detection.


7: Critical infrastructure attacks made scalable

Attackers not only create malware for themselves but are now reselling it online as a service. They are expanding their offerings with OT-based attacks, especially as IT and OT continue to converge at the edge. The lucrative practice of holding such systems and critical infrastructure for ransom could result in endangering individuals’ lives — think of a medical center with an ER trying to function with locked computer systems. Attacks on OT systems have historically belonged to more specialized threat actors, but these capabilities are increasingly being included in attack kits available on the dark web. This makes them scalable; they’re available to a much broader set of bad actors.


8: A new target in Linux

Linux runs many back-end computing systems and has not been a primary target for cybercrime — until recently. But new malicious binaries have been detected that target Microsoft’s WSL (Windows Subsystem for Linux). Additionally, botnet malware is being written for Linux platforms. This takes attacks into the core of the network and increases the threats that organizations need to defend against in general. This has implications for OT devices and supply chains in general that run on Linux platforms.


Forward-thinking security


For those with a criminal mindset, opportunities abound. Security professionals can defeat their plans by designing a holistic strategy that abandons technology siloes for an integrated system of defenses. Vital to fighting current and upcoming attacks are tools that can baseline normal operations, spot anomalies and intervene as needed. To withstand what’s ahead in 2022, finding and implementing a fast, automated and adaptive security strategy is the only way forward. 

KEYWORDS: cyber security data breach ransomware risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Derek manky

Derek Manky is Chief of Security Insights and Global Threat Alliances at Fortinet. He is well known for his cutting-edge insight into current cybersecurity issues and his threat predictions. He is actively involved with several global threat intelligence initiatives including NATO NICP, INTERPOL Expert Working Group, The Cyber Threat Alliance (CTA) working committee (founding member) and FIRST (Forum of Incident Response and Security Teams) – official spokesperson.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0319-Cyber-Feat-slide1_900px

    The Evolution of Artificial Intelligence as a System

    See More
  • hacking

    AI: Beating Bad Actors at Their Own Game

    See More
  • SEC_Web_Top-Cyber-Predictions-2022-1170x658.jpg

    Top 15 cybersecurity predictions for 2022

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing