Cyberthreat trends to watch in 2022


In our three-point blog, we select articles, distil and comment on what we believe may be the three most interesting and relevant points for our clients.


  1. Paying a ransom won’t stop data publication: Infighting amongst criminal gangs is impacting post ransom behavior.  Paying a ransom is less likely to end well, with data being released anyway.

  2. Attacks on the software supply chain: 2021 ended with the Log4j flaw.  Threat actors may go after often forgotten source code in open-source software with the potential of impacting billions of devices.  

  3. Quiet attacks: Threat actors are increasingly trying to infiltrate companies and go unnoticed for a long period.