• Newsletter
  • Contact
  • Press Releases
Sunday, June 22, 2025
Stay Ahead with Heaptalk: Your Go-To Source for Business News
  • Login
  • Register
  • Whats on
  • News
  • Events
  • Technology
  • Industry
  • GovAct
  • Expert Talk
  • Insight
  • Sustainability
No Result
View All Result
Stay Ahead with Heaptalk: Your Go-To Source for Business News
  • Whats on
  • News
  • Events
  • Technology
  • Industry
  • GovAct
  • Expert Talk
  • Insight
  • Sustainability
No Result
View All Result
Stay Ahead with Heaptalk: Your Go-To Source for Business News
No Result
View All Result
Home Feature News

Imperva reveals cybersecurity trends for 2023

Sinta by Sinta
October 9, 2023
in Feature News, News, Technology
0
ransom ddos

From left: Regional Sales Director at Imperva, Fei Wen Ho; Sales Engineer at Imperva, Koh Kwang Hwee; and Solution Architect, APJ at Imperva, Daniel Toh.

Share on FacebookShare on Twitter

“With Ransom DDoS, you can now easily hold companies and enterprises ransom. Not only that, it is becoming even more complex because they (hackers) probably already know the vulnerable spots in your external attack surface, for example, in APIs.”

Heaptalk, Jakarta — In recent years, cyber-attacks have become a public conversation in Indonesia after several data breaches experienced by government agencies and institutions. 

Regarding this issue, Imperva, a well-known cybersecurity company for application programming interfaces (API) security, DDoS protection and data security, revealed its prediction of the upcoming cybersecurity trends. According to Imperva APJ Solution Architect, Daniel Toh, the ransom distributed denial of service (RDDoS) will continue to be a leading threat vector. Daniel also foresees this mode of attack will continue to dominate in the near future. 

World Ai Jakarta 2025
World Ai Jakarta 2025

In 2022, Imperva mitigated a ransom DDoS attack measuring 3.9 million requests per second (RPS). The attack averaged 1.8 million RPS and lasted over 4 hours.

In Daniel’s view, Ransom DDoS is terrifying because besides asking for ransom, the attackers are likely already aware of the vulnerable spots on the external attack surface of the systems owned by companies and organizations. Attackers are likely to exploit these vulnerabilities while the key business stakeholders are distracted and preoccupied with dealing with the ransom DDoS threats.

“With Ransom DDoS, you can now easily hold companies and enterprises ransom. Not only that, it is becoming even more complex because they (hackers) probably already know the vulnerable spots in your external attack surface, for example, in APIs.” said Daniel.

Daniel explained further that threats in the cybersecurity domain can often be visualized in the form of the external attack surface. With digital modernization trends, the attack surface is now expanding. And this provides more avenues for ransom DDoS attacks to target. The Russian and Ukrainian war further contributed to the prevalence and popularity of ransom DDoS attacks.

Daniel voiced, “Since the Ukraine and Russian War broke out, we are seeing more and more threat actors threatening targeted organizations to pay them ransom in cryptocurrencies. When the ransom is not paid, the attackers then bring down systems and sites owned by the targeted organizations. This happened to a lot of critical infrastructures such as healthcare services and government agencies.”

APIs will be the top threat vector in data breaches

Furthermore, applications modernization efforts are inseparable from other key technologies like application programming interfaces (APIs). The nature of APIs inadvertently resulted in many applications being more exposed than before. Which then increases the external attack surface. On this topic, Daniel observed a spike in API attacks across the region that are dominating the cyberattacks landscape.

Daniel shared, “At Imperva, we analyze and protect 1.5 trillion requests across our global networks every month. We are seeing this trend where apps and APIs are being exploited more frequently than before. Due to the external facing nature of public APIs, attackers typically already performed reconnaissance and knew exactly where the weak spots in the APIs are. However it is also important to understand the motivation behind APIs exploits. APIs exploits offer an easy and quick way to gain access to the crown jewels behind them, and that is the data served by APIs. Data is what attackers are really after in today’s context.”

Attacks on API are not new, but they are becoming more commonplace these days. Gartner, a technological research and consulting firm, predicted years ago that by 2022, API would become a top attack vector in data breaches. “Earlier this year, Gartner is now predicting the situation will get worse by the year 2026. By 2026, Gartner believes 50% of cyberattacks will target areas that are not or cannot be protected by zero-trust controls, such as public-facing APIs and social engineering scams.”

“50% of cyberattacks or more are going to come from APIs simply because of the expanded attack surface that I spoke about,” said Daniel.

Echoing Daniel’s views, the Regional Sales Director at Imperva, Fei Wen Ho, added that recent hacking attacks in Indonesia, including Bjorka, have increased the concern of organizations in Indonesia about data security, primarily the financial sector and government agencies. Fei Wen added, “We observed Ransom DDoS, API security, and also data security are the few trends that are getting more and more attention from key business stakeholders, not only in Indonesia, across the whole of Asia Pacific as well. To help Indonesian organizations more readily protect themselves from these trending threats, we are launching our second DDoS scrubbing Point-of-Presence (POP) in Indonesia this year. This second POP reaffirms Imperva’s commitment to the Indonesia market. Most importantly, this will also help our Indonesian customers adhere to data sovereignty regulations while getting the best-of-breed protection against DDoS attacks, API exploits, bots attacks and web application attacks.”

Moving beyond the zero-trust security approach

In response to increasing cyberattacks, organizations have begun to implement a zero-trust security approach to strengthen their systems, including in Indonesia. Zero trust refers to an IT security approach that requires strict identity verification for everyone and devices trying to access resources on a private network, regardless of whether they are inside or outside the network perimeter.

Daniel observed that the majority of large organizations in Indonesia are maturing in implementing the zero-trust concept. He said, “Across Asia, the large Indonesian organizations are comparatively one of the most mature in thinking when we talk about the zero-trust concept.”

The Indonesian market is one of the top 5 largest economies in Asia, alongside China and India. Indonesia has a huge amount of digital economic potential that is powered by a tech-savvy technological workforce and innovation. Therefore, zero-trust implementation indeed is no longer an option, but a necessity. This is even more true when many large organizations are also starting to move their systems to the cloud, including banking and core services.

Daniel reiterated these digital modernization efforts will further expand the current attack surfaces, including APIs exposed on public websites. He advised organizations in Indonesia not only to enhance the API/application security posture but also to try to regain control of this expanded attack surface. Particularly, full API discovery can be considered as the first step to start identifying the potential vulnerable points exposed by the organization’s public facing systems.

“Something as simple as API discovery will go a long way to help us understand how wide our external attack surface is. From there on, organizations can start to learn more about how each and every API is connected to the data backend and incorporate data security posture management into their application and API security lifecycle.” concluded Daniel.

Tags: api attackattack surfacecyberattackcybersecurityimpervaransom ddos

Related Posts

Paving the Way for Expatriate Homeownership: Savyavasa and Permata Bank Launch Exclusive Foreign Mortgage Program

Paving the Way for Expatriate Homeownership: Savyavasa and Permata Bank Launch Exclusive Foreign Mortgage Program

June 5, 2025
KL1 Phase 2 has been completed. Credit: Equinix

Equinix completes KL1 Phase 2 data center in Kuala Lumpur

June 2, 2025
Commemorating Professor Soemitro's 108th anniversary at Soemitro Center (05/29). Credit: Haris

Soemitro Center: A platform for Indonesia’s young economists

May 31, 2025
Lifree breathable adult diapers can help improve skin health. Credit: Haris

Unicharm research: Lifree improves quality of life for elderly

May 31, 2025
Xiaomi's premiumization strategy has yielded positive results in Q1 2025. Credit: Sinta

Applying premiumization strategy, Xiaomi gains 64.5% net profit jump in Q1 2025

May 31, 2025
Kaspersky appointed Defi Nofitra as first country manager for Indonesia. Credit: Kaspersky

Kaspersky appoints Defi Nofitra as first country manager for Indonesia

May 31, 2025
  • 32321

    New tech layoff chapter, Microsoft lays off thousands of its cloud unit ‘Azure’

    1 shares
    Share 0 Tweet 0
  • Nokia rolls out 6600 5G Ultra

    0 shares
    Share 0 Tweet 0
  • Performing a second layoff round, Morgan Stanley to reduce 3,000 workforces in Q2 2023

    1 shares
    Share 0 Tweet 0
  • TikTok Shop to reach a US$15 billion in its GMV transactions

    1 shares
    Share 0 Tweet 0
  • International Women’s Day – Opportunity for Businesses to Support Women in the Workplace

    0 shares
    Share 0 Tweet 0
World Ai Jakarta 2025the 10th world battery & energy industry expo 2025
Heaptalk business news logo

We Build an Ecosystem by Sharing Business News, Headlines and Expert Talks in Professional Perspective and Positive Point of View. Latest business news media headlines platform today.

Recent Posts

  • Paving the Way for Expatriate Homeownership: Savyavasa and Permata Bank Launch Exclusive Foreign Mortgage Program
  • Equinix completes KL1 Phase 2 data center in Kuala Lumpur
  • Soemitro Center: A platform for Indonesia’s young economists
  • Unicharm research: Lifree improves quality of life for elderly
  • Applying premiumization strategy, Xiaomi gains 64.5% net profit jump in Q1 2025

Follow Us

Facebook
Twitter
LinkedIn Youtube Instagram RSS

Newsletter

  • Editorial
  • Newsletter
  • Contact
  • Privacy Policy
  • Cyber Media Guidelines
  • Disclaimer
  • SOP Perlindungan Wartawan

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • News
  • Technology
  • Industry
  • GovAct
  • Events
  • Whats on
  • Expert Talk
  • Insight
  • Sustainability
  • Newsletter
  • Press Releases
  • Login
  • Sign Up

© 2024 Heaptalk.com