CHAPTER 1
EXECUTIVE SUMMARY MAYA HOROWITZ, VP RESEARCH
CHAPTER 2
2022 CYBER SECURITY TRENDS
Russia Ukraine War – The First Hybrid War that Forced Everyone to Take Sides
Country Extortion - Ransomware Groups Step Up to Nation State Actor Level
MICROSOFT BLOCKS INTERNET MACROS IN OFFICE – THE DEVELOPMENTS IN THE EMAIL INFECTION CHAINS
The Mobile Malware Landscape
Cloud Supply Chain Attacks
CHAPTER 3
GLOBAL ANALYSIS
Cyber Attack Categories by Region
Global Threat Index Map
Top malicious file types-web vs. email
Global malware statistics
Top Multipurpose Malware
Top Infostealer Malware
Top Cyptomining Malware
Top Mobile Malware
CHAPTER 4
HIGH PROFILE GLOBAL VULNERABILITIES
Atlassian Confluence – Remote Code Execution (CVE-2022-26134)
‘Log4Shell’ Apache Log4j Remote Code Execution Vulnerability CVE-2021-44228
F5 BIG IP (CVE-2022-1388)
CHAPTER 5
TOP ATTACKS AND CYBER BREACHES H1 2022
CHAPTER 6
H2 2022: WHAT TO EXPECT AND WHAT TO DO
CHAPTER 7
INCIDENT RESPONSE PERSPECTIVE
CHAPTER 8
PREVENTION OF THE NEXT ATTACK IS POSSIBLE
CHAPTER 9
MALWARE FAMILY DESCRIPTIONS
CHAPTER 10
CONCLUSION
01
CHAPTER 1
EXECUTIVE SUMMARY MAYA HOROWITZ, VP RESEARCH
02
CHAPTER 2
2022 CYBER SECURITY TRENDS
03
CHAPTER 3
GLOBAL ANALYSIS
04
CHAPTER 4
HIGH PROFILE GLOBAL VULNERABILITIES
05
CHAPTER 5
TOP ATTACKS AND CYBER BREACHES H1 2022
06
CHAPTER 6
H2 2022: WHAT TO EXPECT AND WHAT TO DO
07
CHAPTER 7
INCIDENT RESPONSE PERSPECTIVE
08
CHAPTER 8
PREVENTION OF THE NEXT ATTACK IS POSSIBLE
09
CHAPTER 9
MALWARE FAMILY DESCRIPTIONS
10
CHAPTER 10
CONCLUSION
BACK TO TOP
CHECK POINT CYBER ATTACK TRENDS:
MID-YEAR REPORT 2022
READ ME