network securityresearch reportSoups

2021 Threat Report From Soups

The following is the 2021 Threat Report From Soups recommended by And this article belongs to the classification: Soups, research report, network security.

Sophos released the 2021 threat report, which covers the insights sophoslabs has gained from its work on malware and spam analysis over the past 12 months.

Main achievements:

Blackmail software

Blackmail software continues to accelerate innovation in their technology and criminal methods. More and more extortion software groups are now engaged in data theft, so they may threaten their targets and blackmail by leaking sensitive private data.

As extortionists put more energy into attacking larger businesses, their demands for ransom have risen sharply.

Everyday threats

The server platform running Windows and Linux at the same time has always been the target of serious attacks, and has been used to attack enterprises from within.

Common services such as RDP and VPN concentrator are still the focus of attacking the network boundary, and the threat elements also use RDP to move horizontally in the damaged network.

We find that the lack of attention to one or more aspects of basic security is the root cause of the most destructive attacks.


Working from home brings new challenges, extending the security boundary of enterprises to thousands of home networks protected by different security levels.

Cloud computing has successfully withstood the needs of many enterprises for secure computing environment, but it still faces challenges different from traditional enterprise network.

Criminal organizations have entered the service economy system. In 2020, network security professionals from all over the world formed a rapid response force to combat the threat of any social engineering related to New Coronavirus.

Non traditional platform

Although mobile platform operators have made efforts to monitor malicious code in applications, attackers are still working at the edge and have developed technologies to bypass these code scanning.

Data scientists have applied methods borrowed from the field of bio epidemiology to spam attacks and malware payloads as a way to bridge the detection gap.

If you want to get the full report, you can contact us by leaving us the comment. If you think the information here might be helpful to others, please actively share it. If you want others to see your attitude towards this report, please actively comment and discuss it. Please stay tuned to us, we will keep updating as much as possible to record future development trends. is a website that focuses on future technologies, markets and user trends. We are responsible for collecting the latest research data, authority data, industry research and analysis reports. We are committed to becoming a data and report sharing platform for professionals and decision makers. We look forward to working with you to record the development trends of today’s economy, technology, industrial chain and business model.Welcome to follow, comment and bookmark us, and hope to share the future with you, and look forward to your success with our help.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button