CHAPTER 1
Introduction to the check point 2022 security report
CHAPTER 2
Timeline of 2021's major cyber events
CHAPTER 3
2021’s cyber security trends
From SolarWinds to Log4j
The Fallout of Cyber Attacks
Cloud Services Under Attack
Mobile Arena Developments
Cracks in the Ransomware Ecosystem
CHAPTER 4
Malware spotlight: emotet’s return
CHAPTER 5
Global statistics
Global Malware Statistics
Global Analysis of Top Malware
Botnet Global Analysis
Infostealer Malware Global Analysis
Cryptominers Global Analysis
Banking Trojans Global Analysis
Mobile Malware Global Analysis
CHAPTER 6
High profile global vulnerabilities
'Log4Shell' Apache Log4j - Remote Code Execution (CVE-2021-44228)
'ProxyLogon' Microsoft Exchange Server - Authentication Bypass (CVE-2021-26855)
Atlassian Confluence - Remote Code Execution (CVE-2021-26084)
CHAPTER 7
Preventing the next cyber pandemic - A strategy for achieving better security
Threat prevention - prevent attacks before they happen
When your perimeter is everywhere and attacks keep advancing, your business needs accurate prevention based on real time threat intelligence
Secure everything, as everything is a potential target
Leveraging a complete unified architecture
Maintain security hygiene
APPENDIX
Malware family descriptions
Conclusion
01
CHAPTER 1
Introduction to the check point 2022 security report
02
CHAPTER 2
Timeline of 2021's major cyber events
03
CHAPTER 3
2021’s cyber security trends
04
CHAPTER 4
Malware spotlight: emotet’s return
05
CHAPTER 5
Global statistics
06
CHAPTER 6
High profile global vulnerabilities
07
CHAPTER 7
Preventing the next cyber pandemic - A strategy for achieving better security
08
CHAPTER 8
Malware family descriptions
BACK TO TRENDS
Check Point 2022
Cyber Security Report
READ ME