{"id":9834,"date":"2021-12-31T11:18:44","date_gmt":"2021-12-31T11:18:44","guid":{"rendered":"https:\/\/fieldtrust.be\/?p=9834"},"modified":"2022-01-22T11:21:33","modified_gmt":"2022-01-22T11:21:33","slug":"bitdefender-issues-top-5-cybersecurity-predictions-for-2022","status":"publish","type":"post","link":"https:\/\/fieldtrust.be\/nl\/bitdefender-issues-top-5-cybersecurity-predictions-for-2022","title":{"rendered":"Bitdefender Issues Top 5 Cybersecurity Predictions for 2022"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"9834\" class=\"elementor elementor-9834\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6547b3c5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6547b3c5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-722c4d5c\" data-id=\"722c4d5c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-71bb8dff elementor-widget elementor-widget-text-editor\" data-id=\"71bb8dff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This year is coming to an end, and the cybersecurity community is working hard on technologies and solutions that will protect consumers and business users in 2022 and beyond. Bitdefender Labs and its Managed Detection and Response team are renowned for their keen insights of the rapidly evolving threat landscape.<\/p><p>Here are the top five cybersecurity predictions for 2022 from our experts:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5bd29b3e elementor-widget elementor-widget-heading\" data-id=\"5bd29b3e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">1. Ransomware will continue to dominate the threat landscape<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3770609a elementor-widget elementor-widget-text-editor\" data-id=\"3770609a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Unfortunately, our prediction for increased ransomware activity in 2021 came true. 2021 was extremely active for ransomware. Solar Winds, The Colonial Pipeline, Kaseya, and Brenntag are just some of the big names involved in ransomware attacks that the US Treasury tied to $5.2 billion worth of payments during 2021 alone.<\/p><p>\u201cRansomware will continue to be the most lucrative type of cyber-crime in 2022. We expect to see an increase in Ransomware-as-a-Service (RaaS) attacks that will focus on data exfiltration for blackmailing purposes,\u201d said Dragos Gavrilut, director of the Cyber Threat Intelligence Lab at Bitdefender. \u201cJust like any mature business, ransomware will have to constantly keep up with both competition and cyber-security vendors alike.\u201d<\/p><p>Bitdefender also expects a boost in ransomware for Linux environments that target ESXi storage or templates. \u2018silent ransomware\u2019 \u2013 malware that stays dormant for periods of time before encrypting data will likely be used in more attacks. The Java Log4j vulnerability that recently shook up the cybersecurity community because of its pervasiveness and ease of exploit, created a perfect storm for ransomware. We expect to see fallout from Log4j in the coming months and for potentially years to come. Jen Easterly, head of the Cybersecurity and Infrastructure Security Agency (CISA), called it &#8220;the most serious flaw&#8221; she has seen in her decades-long career.<\/p><p>Overall, ransomware as a service will undergo reorganization to focus on becoming more resilient, going into the realm of zero-day exploits for maximized reach.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d0c85b elementor-widget elementor-widget-heading\" data-id=\"8d0c85b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2. State-sponsored attacks will leave communities in the dark<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-475a4b0 elementor-widget elementor-widget-text-editor\" data-id=\"475a4b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Political tensions will likely have a great impact on the cyber-realm as nation-states race for digital supremacy. 2022 will likely be the year of cyber-attacks against critical infrastructure. Killware could be the weapon of choice since it can be deployed using similar tactics as classic APTs and is effective against power grids, water and sewage plants or public transportation with immediate impact on communities and societies. \u201cIt\u2019s not just public utilities, but also chunks of the Internet that attackers might want to disrupt in 2022,\u201d confirms Alex \u201cJay\u201d Balan, director of security research at Bitdefender.<\/p><p>DDoS attacks and hijacking of the Border Gateway Protocol (BGP) will soar, causing massive disruption to digital economies and telecommunication. \u201cWe will potentially see hack-back initiatives around the world, especially against nation-states that provide cyber-criminals safe harbor for digital crimes targeting US or European institutions,\u201d added Catalin Co\u0219oi chief security strategist at Bitdefender.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50b73b7 elementor-widget elementor-widget-heading\" data-id=\"50b73b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">3. Supply chain attacks and zero-day markets will rise<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-87db803 elementor-widget elementor-widget-text-editor\" data-id=\"87db803\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Among the lessons learned in 2021, supply chain attacks targeting Managed Service Providers (MSPs) were the hardest to mitigate. In contrast to other threats, supply chain attacks are more silent, more difficult to stop and propagate at a faster pace. Professional cyber-crime groups will focus more on breaching MSPs to deliver ransomware to larger pools of potential victims. \u201cAs cyber-security vendors started to address the documented MiTRE techniques, cyber-criminals will focus their research on the discovery and implementation of new techniques for implementing MiTRE\/Kill-chain tactics. We expect to see new attack avenues leveraging COM\/WMI, as these are insufficiently monitored by existing EDR technologies,\u201d predicts Dan-Horea Lutas, senior manager at Bitdefender who oversees behavior-based malware detection and anti-exploit technologies.<\/p><p>Public open-source code repositories such as Pypi or NPM will also gain unwanted attention from cyber-criminal groups looking to sneak malicious code into products or infrastructure for supply chain attack purposes.<\/p><p>On top of supply chain attacks, Bitdefender also expects to see an increase in usage of zero-day exploits in certain targeted attacks. In 2021, Bitdefender saw an increase in zero-day vulnerabilities in all major technology stacks (Chrome, Exchange, Office, Windows 10, iOS), and the future does not look any better. Tianfu Cup, the Chinese version of Pwn2Own was a clear display of the capabilities available to other non-English speaking countries.<\/p><p>But there is more than zero-day vulnerabilities that will allow cyber-criminals to cause widespread damage to businesses. Tools such as CobaltStrike will become increasingly adopted by malware operators. \u201cCyber-criminals find inspiration inside the community \u2013 if one cyber-crime group rises to fame by employing existing tools, the rest of the community will follow suit,\u201d says Radu Portase, principal technical lead at Bitdefender. \u201cEmotet malware is a prime example of such behavior, as it is on the rise again and successfully uses CobaltStrike beacons to expedite the installation of ransomware in corporate networks.\u201d<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40c93bb elementor-widget elementor-widget-heading\" data-id=\"40c93bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">4. Data breaches will fuel a dumpster fire of business attacks<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26091e4 elementor-widget elementor-widget-text-editor\" data-id=\"26091e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As personal information stolen in data breaches becomes more widely available to cyber-criminals, spam campaigns will become much more targeted. From full names and phone number, other exposed information such as passwords, physical addresses, payment logs or sexual orientation will be used to create tailored and convincing phishing or extortion campaigns.<\/p><p>While the spear phishing \u2013 whether it\u2019s whaling, business email compromise (BEC), email account compromise (EAC) &#8211; becomes more sophisticated, it will continue to be a main attack vector for businesses and work from home environments, predicts Adrian Miron, manager of the Content Filtering Lab at Bitdefender.<\/p><p>The scams of 2022 will likely capitalize on the busy and exclusively online recruitment processes imposed by the Coronavirus pandemic. Cyber-criminals will start impersonating companies to dupe potential candidates into infecting their devices via popular document attachments. Additionally, cyber-crime operators will likely use this remote onboarding opportunity to recruit unwary people looking for jobs into illegal activities such as money-muling.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23f4732 elementor-widget elementor-widget-heading\" data-id=\"23f4732\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">5. IoT, Web infrastructure and Dark Markets<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ccf4b20 elementor-widget elementor-widget-text-editor\" data-id=\"ccf4b20\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>2022 will likely bring a major increase in attacks on cloud infrastructures, including those hosted by top-tier providers . Misconfiguration and a shortage of skilled cyber-security workforce will play a significant role in data breaches and infrastructure compromise, thinks Catalin Cosoi, chief security strategist at Bitdefender.<\/p><p>As the world is gradually preparing for a permanent work-from-anywhere scenario, companies are making constant effort into moving legacy services to the cloud. Cloud attacks will intensify, with a particular focus on Azure AD and Office365, where we expect to see a spike in tools development, especially on Office365 and Azure AD.<\/p><p>With the crypto-currency ecosystem in full swing, we expect to see mounting cyber-criminal interest to attack exchange services, miners, wallet stealers, and launch crypto-currency scams.<\/p><p>The increased interconnectivity in smart cars will also create new opportunities for cyber-criminals. Vehicle telematics has become a cause for concern in the past few years as manufacturers attempt to build services or monetize information sent out by vehicles on the road. But data theft is just part of the cause for concern, says Alexandru \u201cJay\u201d Balan, as cyber-criminals can leverage internet-connected vehicles to facilitate theft, obtain unauthorized access or even take remote control of the car causing potentially deadly consequences.<\/p><p>Dark markets acted chaotically in 2020-2021, but as consecrated ones get dismantled in coordinated law enforcement actions, we believe that we\u2019ll see new contenders rising in 2022, that will rake up to 50 percent of the illegal substance deals over the dark net, believes Co\u0219oi.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cfb7fb3 elementor-widget elementor-widget-heading\" data-id=\"cfb7fb3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Preparing for 2022 and beyond<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f8b369c elementor-widget elementor-widget-text-editor\" data-id=\"f8b369c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As we\u2019re laying these pieces in writing, the cyber-security industry is hard at work designing security solutions of tomorrow. Built for resilience, the Bitdefender GravityZone Ultra safeguards your organization from a full spectrum of sophisticated cyber threats. With more than 30 machine learning-driven security technologies, GravityZone provides multiple layers of defense that consistently outperforms conventional endpoint security, as proven in independent tests. A single-agent, single-console solution for physical, virtual, mobile, and cloud-based endpoints and email, GravityZone adds the human element to your security ecosystem, minimizing management overhead while giving you ubiquitous visibility and control.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>This year is coming to an end, and the cybersecurity community is working hard on technologies and solutions that will protect consumers and business users in 2022 and beyond. Bitdefender Labs and its Managed Detection and Response team are renowned for their keen insights of the rapidly evolving threat landscape. Here are the top five [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":9837,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":{"1":"post","5":"has-post-thumbnail"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Bitdefender Issues Top 5 Cybersecurity Predictions for 2022 &#8211; Fieldtrust<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fieldtrust.be\/nl\/bitdefender-issues-top-5-cybersecurity-predictions-for-2022\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bitdefender Issues Top 5 Cybersecurity Predictions for 2022 &#8211; Fieldtrust\" \/>\n<meta property=\"og:description\" content=\"This year is coming to an end, and the cybersecurity community is working hard on technologies and solutions that will protect consumers and business users in 2022 and beyond. Bitdefender Labs and its Managed Detection and Response team are renowned for their keen insights of the rapidly evolving threat landscape. Here are the top five [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fieldtrust.be\/nl\/bitdefender-issues-top-5-cybersecurity-predictions-for-2022\/\" \/>\n<meta property=\"og:site_name\" content=\"Fieldtrust\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-31T11:18:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-22T11:21:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fieldtrust.be\/wp-content\/uploads\/2022\/01\/Bitdefender-Belgium.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"862\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"fieldtrust_admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@fieldtrustbnl\" \/>\n<meta name=\"twitter:site\" content=\"@fieldtrustbnl\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"fieldtrust_admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/bitdefender-issues-top-5-cybersecurity-predictions-for-2022#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/bitdefender-issues-top-5-cybersecurity-predictions-for-2022\"},\"author\":{\"name\":\"fieldtrust_admin\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#\\\/schema\\\/person\\\/105168939d5009f3329c58214655a3bd\"},\"headline\":\"Bitdefender Issues Top 5 Cybersecurity Predictions for 2022\",\"datePublished\":\"2021-12-31T11:18:44+00:00\",\"dateModified\":\"2022-01-22T11:21:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/bitdefender-issues-top-5-cybersecurity-predictions-for-2022\"},\"wordCount\":1302,\"publisher\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/bitdefender-issues-top-5-cybersecurity-predictions-for-2022#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/fieldtrust.be\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Bitdefender-Belgium.png\",\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/bitdefender-issues-top-5-cybersecurity-predictions-for-2022\",\"url\":\"https:\\\/\\\/fieldtrust.be\\\/bitdefender-issues-top-5-cybersecurity-predictions-for-2022\",\"name\":\"Bitdefender Issues Top 5 Cybersecurity Predictions for 2022 &#8211; Fieldtrust\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/bitdefender-issues-top-5-cybersecurity-predictions-for-2022#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/bitdefender-issues-top-5-cybersecurity-predictions-for-2022#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/fieldtrust.be\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Bitdefender-Belgium.png\",\"datePublished\":\"2021-12-31T11:18:44+00:00\",\"dateModified\":\"2022-01-22T11:21:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/bitdefender-issues-top-5-cybersecurity-predictions-for-2022#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fieldtrust.be\\\/bitdefender-issues-top-5-cybersecurity-predictions-for-2022\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/bitdefender-issues-top-5-cybersecurity-predictions-for-2022#primaryimage\",\"url\":\"https:\\\/\\\/fieldtrust.be\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Bitdefender-Belgium.png\",\"contentUrl\":\"https:\\\/\\\/fieldtrust.be\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Bitdefender-Belgium.png\",\"width\":1200,\"height\":862},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/bitdefender-issues-top-5-cybersecurity-predictions-for-2022#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fieldtrust.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bitdefender Issues Top 5 Cybersecurity Predictions for 2022\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#website\",\"url\":\"https:\\\/\\\/fieldtrust.be\\\/\",\"name\":\"Fieldtrust\",\"description\":\"The Value-Added Distributor for MSPs\",\"publisher\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fieldtrust.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#organization\",\"name\":\"Fieldtrust\",\"url\":\"https:\\\/\\\/fieldtrust.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/fieldtrust.be\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/logo-FT.svg\",\"contentUrl\":\"https:\\\/\\\/fieldtrust.be\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/logo-FT.svg\",\"width\":1,\"height\":1,\"caption\":\"Fieldtrust\"},\"image\":{\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/fieldtrustbnl\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/fieldtrust\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCchBwXtTmebI8KkdOGrcC5w\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fieldtrust.be\\\/#\\\/schema\\\/person\\\/105168939d5009f3329c58214655a3bd\",\"name\":\"fieldtrust_admin\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bitdefender Issues Top 5 Cybersecurity Predictions for 2022 &#8211; Fieldtrust","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fieldtrust.be\/nl\/bitdefender-issues-top-5-cybersecurity-predictions-for-2022\/","og_locale":"nl_NL","og_type":"article","og_title":"Bitdefender Issues Top 5 Cybersecurity Predictions for 2022 &#8211; Fieldtrust","og_description":"This year is coming to an end, and the cybersecurity community is working hard on technologies and solutions that will protect consumers and business users in 2022 and beyond. Bitdefender Labs and its Managed Detection and Response team are renowned for their keen insights of the rapidly evolving threat landscape. Here are the top five [&hellip;]","og_url":"https:\/\/fieldtrust.be\/nl\/bitdefender-issues-top-5-cybersecurity-predictions-for-2022\/","og_site_name":"Fieldtrust","article_published_time":"2021-12-31T11:18:44+00:00","article_modified_time":"2022-01-22T11:21:33+00:00","og_image":[{"width":1200,"height":862,"url":"https:\/\/fieldtrust.be\/wp-content\/uploads\/2022\/01\/Bitdefender-Belgium.png","type":"image\/png"}],"author":"fieldtrust_admin","twitter_card":"summary_large_image","twitter_creator":"@fieldtrustbnl","twitter_site":"@fieldtrustbnl","twitter_misc":{"Geschreven door":"fieldtrust_admin","Geschatte leestijd":"7 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fieldtrust.be\/bitdefender-issues-top-5-cybersecurity-predictions-for-2022#article","isPartOf":{"@id":"https:\/\/fieldtrust.be\/bitdefender-issues-top-5-cybersecurity-predictions-for-2022"},"author":{"name":"fieldtrust_admin","@id":"https:\/\/fieldtrust.be\/#\/schema\/person\/105168939d5009f3329c58214655a3bd"},"headline":"Bitdefender Issues Top 5 Cybersecurity Predictions for 2022","datePublished":"2021-12-31T11:18:44+00:00","dateModified":"2022-01-22T11:21:33+00:00","mainEntityOfPage":{"@id":"https:\/\/fieldtrust.be\/bitdefender-issues-top-5-cybersecurity-predictions-for-2022"},"wordCount":1302,"publisher":{"@id":"https:\/\/fieldtrust.be\/#organization"},"image":{"@id":"https:\/\/fieldtrust.be\/bitdefender-issues-top-5-cybersecurity-predictions-for-2022#primaryimage"},"thumbnailUrl":"https:\/\/fieldtrust.be\/wp-content\/uploads\/2022\/01\/Bitdefender-Belgium.png","articleSection":["Uncategorized"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/fieldtrust.be\/bitdefender-issues-top-5-cybersecurity-predictions-for-2022","url":"https:\/\/fieldtrust.be\/bitdefender-issues-top-5-cybersecurity-predictions-for-2022","name":"Bitdefender Issues Top 5 Cybersecurity Predictions for 2022 &#8211; Fieldtrust","isPartOf":{"@id":"https:\/\/fieldtrust.be\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fieldtrust.be\/bitdefender-issues-top-5-cybersecurity-predictions-for-2022#primaryimage"},"image":{"@id":"https:\/\/fieldtrust.be\/bitdefender-issues-top-5-cybersecurity-predictions-for-2022#primaryimage"},"thumbnailUrl":"https:\/\/fieldtrust.be\/wp-content\/uploads\/2022\/01\/Bitdefender-Belgium.png","datePublished":"2021-12-31T11:18:44+00:00","dateModified":"2022-01-22T11:21:33+00:00","breadcrumb":{"@id":"https:\/\/fieldtrust.be\/bitdefender-issues-top-5-cybersecurity-predictions-for-2022#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fieldtrust.be\/bitdefender-issues-top-5-cybersecurity-predictions-for-2022"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/fieldtrust.be\/bitdefender-issues-top-5-cybersecurity-predictions-for-2022#primaryimage","url":"https:\/\/fieldtrust.be\/wp-content\/uploads\/2022\/01\/Bitdefender-Belgium.png","contentUrl":"https:\/\/fieldtrust.be\/wp-content\/uploads\/2022\/01\/Bitdefender-Belgium.png","width":1200,"height":862},{"@type":"BreadcrumbList","@id":"https:\/\/fieldtrust.be\/bitdefender-issues-top-5-cybersecurity-predictions-for-2022#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fieldtrust.be\/"},{"@type":"ListItem","position":2,"name":"Bitdefender Issues Top 5 Cybersecurity Predictions for 2022"}]},{"@type":"WebSite","@id":"https:\/\/fieldtrust.be\/#website","url":"https:\/\/fieldtrust.be\/","name":"Fieldtrust","description":"The Value-Added Distributor for MSPs","publisher":{"@id":"https:\/\/fieldtrust.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fieldtrust.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/fieldtrust.be\/#organization","name":"Fieldtrust","url":"https:\/\/fieldtrust.be\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/fieldtrust.be\/#\/schema\/logo\/image\/","url":"https:\/\/fieldtrust.be\/wp-content\/uploads\/2021\/01\/logo-FT.svg","contentUrl":"https:\/\/fieldtrust.be\/wp-content\/uploads\/2021\/01\/logo-FT.svg","width":1,"height":1,"caption":"Fieldtrust"},"image":{"@id":"https:\/\/fieldtrust.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/fieldtrustbnl","https:\/\/www.linkedin.com\/company\/fieldtrust\/","https:\/\/www.youtube.com\/channel\/UCchBwXtTmebI8KkdOGrcC5w"]},{"@type":"Person","@id":"https:\/\/fieldtrust.be\/#\/schema\/person\/105168939d5009f3329c58214655a3bd","name":"fieldtrust_admin"}]}},"_links":{"self":[{"href":"https:\/\/fieldtrust.be\/nl\/wp-json\/wp\/v2\/posts\/9834","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fieldtrust.be\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fieldtrust.be\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fieldtrust.be\/nl\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/fieldtrust.be\/nl\/wp-json\/wp\/v2\/comments?post=9834"}],"version-history":[{"count":5,"href":"https:\/\/fieldtrust.be\/nl\/wp-json\/wp\/v2\/posts\/9834\/revisions"}],"predecessor-version":[{"id":9841,"href":"https:\/\/fieldtrust.be\/nl\/wp-json\/wp\/v2\/posts\/9834\/revisions\/9841"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fieldtrust.be\/nl\/wp-json\/wp\/v2\/media\/9837"}],"wp:attachment":[{"href":"https:\/\/fieldtrust.be\/nl\/wp-json\/wp\/v2\/media?parent=9834"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fieldtrust.be\/nl\/wp-json\/wp\/v2\/categories?post=9834"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fieldtrust.be\/nl\/wp-json\/wp\/v2\/tags?post=9834"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}