
In fact, this malware had a 500% growth from 2010 to 2020. Between 20, there was a 40% increase in Linux malware families, according to the latest data from the IBM Security X-Force Threat Intelligence Index (TII). Malware trends are on the riseĪlthough Linux malware trends have been increasing steadily since 2018, largely driven by the opportunities that crypto-mining presents, there’s been a sharper rise in recent years. As you can imagine, Linux malware presents an incredibly alluring and lucrative area of focus for threat actors.
CLOUD CRYPTER CODE
Linux - the open-source code that supports cloud infrastructure and data storage - is believed to power around 90% of cloud workloads. So perhaps it’s no surprise that malware, like work, is undergoing its own metamorphosis, with a growing emphasis on Linux malware innovation. “What we’re seeing across the board is threat actors investing heavily in cloud-focused malware.” They’re watching organizations moving into the cloud, and of course they’re going to follow that money,” says Charles DeBeck, Senior Cyber Threat Intelligence Analyst for IBM Security. “Bad guys are always going to follow the money.

As people are working with tools and applications that weren’t designed to securely function in the cloud - resulting in overlooked gaps in cloud security - opportunities to exploit security vulnerabilities abound.

The reality is, for many organizations working in a cloud environment, security hasn’t been a primary concern. It's been an exciting time of accelerated digital transformation, but has the hasty shift into the cloud environment left organizations more vulnerable? Overlooked gaps in cloud security Companies and their employees have proven incredibly adaptable, and our ability to thrive collaborating online, rather than in a shared physical working space, has ushered in a work-from-anywhere era. The very idea of what constitutes “work” has undergone a metamorphosis over the past two years. Taking proactive measures to address security concerns when moving work to the cloud.
