Threat intelligence

Cyber Threats

Threat intelligence Cyber Threats

The Cyber Threat Landscape is Evolving Quickly

Attackers constantly develop new techniques, and new vulnerabilities emerge every day.  And every year, you must evolve and adapt your defenses to protect against the next wave of large-scale threats you will face.

These are the top cyber security threats emerging on the horizon.  With Cyber Citadel threat intelligence and cyber security monitoring, we can help protect you.


Ransomware is evolving as attackers will find more and more initial exploits to quickly reach high-value targets and increase the size of their ransom demands substantially.  Cloud admin accounts are targeted for compromise as the beach head.  The result is cloud console capture and locking out the entire organization from their cloud, thereby threatening business operation shutdown.

Supply Chain Threats

With a supply chain attack, a threat actor will target and compromise a 3rd party provider as a means of gaining a foothold into another organization.  From there, the attacker can spread through the company’s products and compromise their hundreds or thousands of customers.

Now that every organization depends on a large, sophisticated, and highly-interconnected supply chain, cybercriminals can use this threat to break into any network they want.  Forrester estimates that 60% of upcoming security incidents will involve supply chain issues.

Vertical Specialized Threats

IoT is becoming an integral part of new innovative solutions in many industries.  More attacks will specifically target Operational Technology (OT) in healthcare, manufacturing, and utilities.

Cloud Threats

The cloud will become the primary attack vector for initial infiltration into an organization.  Cloud consoles will be heavily targeted for account take-over. Once the cloud console is compromised, the threat actors gain complete control of the infrastructure.

API Threats

API threats will grow in sophistication and are expected to exploit misconfigured authentication and authorization controls as easy initial vectors.

External Remote Services Threats

Because the remote work infrastructure is not changing, attackers will continue to use the attacks targeted to Remote Desktop Protocol (RDP), VPNs, VNCs, and the like as well as a related increase in mobile device threats.

Conventional Attacks

Cybercriminals will continue innovating and improving these attacks and leveraging new technologies to launch them with increasing speed, scale, and sophistication.