Sophos Philippines Logo

Sophos 2022 Threat Report

Interrelated threats targeting an interdependent world

As we move into 2022, ransomware shows no signs of slowing down – that’s no surprise. What we have seen in the past 18 months, however, is a shift in tactics: targets have shifted to ever-larger organizations, and the business model that dictates how ransomware attacks occur has evolved. It’s up to IT professionals to proactively deal with these trends to meet the challenges just on the horizon and beyond.

Ransomware-as-a-Service has changed the landscape – find out the impact of this shift

As we move into 2022, ransomware shows no signs of slowing down – that’s no surprise. What we have seen in the past 18 months, however, is a shift in tactics: targets have shifted to ever-larger organizations, and the business model that dictates how ransomware attacks occur has evolved. It’s up to IT professionals to proactively deal with these trends to meet the challenges just on the horizon and beyond.

In this report you’ll find:

  • The future of ransomware
  • The impact of Ransomware-as-a-Service
  • The expanding threat of extortion-style attacks
  • How misuse of “threat emulation” tools has impacted cybersecurity
  • AI and its role in 2022 and beyond

Download the report now

Some of the topics covered in this threat report:

Malware-begets-malware

Malware begets
malware

Hear how the rise of Cobalt Strike has been used by hackers as part of their access and lateral movement.

Malware-distribution-framework

Malware distribution frameworks

Find out how malware families have switched their business model to deliver malware payloads more effectively.

The-AI-cybersecurity-revolution-continues

The AI cybersecurity revolution continues

Learn about what has changed in AI and machine learning in cybersecurity and how it is used to predict and prevent cyber threats.

Hybrid-attacks

Hybrid attacks

See how where once attacks could be broken down into two distinct categories, a new hybrid model of broad and targeted attack has emerged.

Mobile-Malware

Mobile Malware

Find out the latest on how malware targets mobile devices and how protecting those devices has become essential.

Pressure attacks

Discover how adversaries are pressurizing individuals to pay up.

Shopping Basket