{"id":520996,"date":"2021-08-02T06:03:20","date_gmt":"2021-08-02T10:03:20","guid":{"rendered":"https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-manipulate-reality-via-integrity-and-destructive-attacks-vmware-report-finds\/"},"modified":"2021-08-02T06:03:20","modified_gmt":"2021-08-02T10:03:20","slug":"cybercriminals-manipulate-reality-via-integrity-and-destructive-attacks-vmware-report-finds","status":"publish","type":"post","link":"https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-manipulate-reality-via-integrity-and-destructive-attacks-vmware-report-finds\/","title":{"rendered":"Cybercriminals Manipulate Reality via Integrity and Destructive Attacks, VMware Report Finds"},"content":{"rendered":"<p>        <!--.bwalignc { text-align: center; list-style-position: inside }\n.bwlistdisc { list-style-type: disc }body {font:normal small Arial,Helvetica,sans-serif;color:#000;background-color:#fff;padding:24px;margin:0;} a img {border:0;} h3 {font-size:medium;color:#000;margin:0 0 1em 0; text-align:center;}-->  <\/p>\n<p class=\"bwalignc\"><b>Cybercriminals Manipulate Reality via Integrity and Destructive Attacks, VMware Report Finds<\/b><\/p>\n<p class=\"bwalignc\"><i>Defenders fight back against weaponization of new technologies, industrialization of e-crime, and burnout<\/i><\/p>\n<p>PALO ALTO, Calif.&#8211;(<a href=\"http:\/\/www.businesswire.com\">BUSINESS WIRE<\/a>)&#8211;<br \/>\nAt Black Hat USA 2021, VMware, Inc. (NYSE: VMW) released its seventh annual Global Incident Response Threat Report, which analyzes how attackers are manipulating reality to reshape the modern threat landscape. The report found a drastic rise in destructive attacks, where adversaries deploy advanced techniques to deliver more targeted, sophisticated attacks that distort digital reality, be it via business communications compromise (BCC) or the manipulation of time.\n<\/p>\n<p id=\"news-body-cta\">This press release features multimedia. View the full release here: <a href=\"https:\/\/www.businesswire.com\/news\/home\/20210802005148\/en\/\" rel=\"nofollow\">https:\/\/www.businesswire.com\/news\/home\/20210802005148\/en\/<\/a><\/p>\n<div id=\"bwbodyimg\" style=\"width: 480px;float:left;padding-left:0px;padding-right:20px;padding-top:0px;padding-bottom:0px\"><img decoding=\"async\" src=\"https:\/\/mms.businesswire.com\/media\/20210802005148\/en\/895378\/4\/VMWare_Threat_Report_social_Twitter_01.jpg\" alt=\"(Graphic: Business Wire)\" \/><\/p>\n<p style=\"font-size:85%\">(Graphic: Business Wire)<\/p>\n<\/div>\n<p>\n\u201cToday, we\u2019re seeing a nexus between nation-states and cybercriminals continue to rapidly advance the development of increasingly sophisticated and destructive cyberattacks, combined with the broadening of the attack surface as a result of COVID-19,\u201d says Tom Kellermann, head of cybersecurity strategy, VMware. \u201cThe digital and physical worlds have converged, and everything can be manipulated by modern-day attackers. The reality is that first adopters of advanced technologies, such as artificial intelligence and machine learning, are often cybercriminals on the dark web and in nation-states intelligence communities.\u201d\n<\/p>\n<p>\nDefenders are struggling to counter these complex attacks and gain visibility into new environments, such as the cloud, containers, and business communication applications. The report found that defenders are also grappling with mental health concerns and heightened job expectations, with 51% experiencing extreme stress or burnout over the past year.\n<\/p>\n<p>\n\u201cBurnout is a huge issue with incident response teams, who are handling a spike in engagements in what is still a largely remote environment,\u201d says Rick McElroy, principal cybersecurity strategist at VMware. \u201cIt only further underscores the need for leaders to build resilient teams, whether that means considering rotations of work, empowering individuals to take mental health days, or any number of other initiatives aimed at nurturing personal growth and development.\u201d\n<\/p>\n<p>\nAdditional key findings from the 2021 Global Incident Response Threat Report include:\n<\/p>\n<ul class=\"bwlistdisc\">\n<li><b>The nexus between nation-states and e-crime heightens the threat landscape and exploit vulnerabilities:<\/b> Among those who have encountered ransomware attacks in the past year, 64% witnessed affiliate programs and\/or partnerships between ransomware groups. Defenders are also looking for new ways to fight back: 81% said they are willing to leverage active defense in the next 12 months.\n<\/li>\n<li><b>Advanced techniques are being used to make attacks more destructive and targeted: <\/b>Respondents indicate that targeted victims now experience destructive\/integrity attacks more than 50% of the time. Cybercriminals are achieving this through emerging techniques, like the manipulation of time stamps, or Chronos attacks, which nearly 60% of respondents have observed. Catalyzed by the shift to remote work, 32% of respondents also experienced adversaries leveraging business communication platforms to move around a given environment and launch sophisticated attacks.\n<\/li>\n<li><b>With cloud-jacking on the rise, cloud security remains a top priority: <\/b>Following the rush to cloud technology amid the pandemic, cybercriminals have continued to exploit these environments. Nearly half (43%) of respondents said more than a third of attacks were targeted at cloud workloads, with almost a quarter (22%) saying more than half were. For this reason, 6 in 10 respondents said cloud security tools are their top priority to implement.\n<\/li>\n<\/ul>\n<p>\nFor more information on the evolving threat landscape as well as actionable guidance and recommendations for incident responders and security teams, download the full report <a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fwww.carbonblack.com%2Fresources%2Fglobal-incident-response-threat-report-manipulating-reality&amp;esheet=52469366&amp;newsitemid=20210802005148&amp;lan=en-US&amp;anchor=here&amp;index=1&amp;md5=49be8bea852658e2778eb1cb75ff8ffd\">here<\/a>.\n<\/p>\n<p><b>Methodology<\/b><\/p>\n<p>\nVMware conducted an online survey about trends in the incident response landscape in May and June 2021, with 123 cybersecurity and incident response professionals from around the world participating in the study. Percentages in certain questions exceed 100% because respondents were asked to check all that apply. Due to rounding, percentages used in all questions may not add up to 100%.\n<\/p>\n<p><b>VMware at Black Hat USA 2021<\/b><\/p>\n<p>\nVMware will discuss the findings from this report and other key security topics in the virtual sessions listed below. Visit our virtual <a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fapp.swapcard.com%2Fevent%2Fblack-hat-usa-2021%2Fexhibitor%2FRXhoaWJpdG9yXzQ2NDk1Mw%253D%253D&amp;esheet=52469366&amp;newsitemid=20210802005148&amp;lan=en-US&amp;anchor=Black+Hat+USA+2021+booth&amp;index=2&amp;md5=51625d74fdc820e42287f36d052156d4\">Black Hat USA 2021 booth<\/a>, and follow along with us on social <a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Ftwitter.com%2Fvmwarenews&amp;esheet=52469366&amp;newsitemid=20210802005148&amp;lan=en-US&amp;anchor=%40VMwareNews&amp;index=3&amp;md5=ed12a442ae6f05ec7c63b32e09cecbca\">@VMwareNews<\/a> and in the <a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fwww.vmware.com%2Fcompany%2Fnews%2Fmedia-resources%2Fsecurity-anywhere-workspace.html&amp;esheet=52469366&amp;newsitemid=20210802005148&amp;lan=en-US&amp;anchor=VMware+Newsroom&amp;index=4&amp;md5=c370cd4eeb6b78860f70e8bebca461c2\">VMware Newsroom<\/a>.\n<\/p>\n<p><a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fwww.blackhat.com%2Fus-21%2Fsponsored-sessions%2Fschedule%2F%23exposing-vulnerabilities-in-kubernetes-24506&amp;esheet=52469366&amp;newsitemid=20210802005148&amp;lan=en-US&amp;anchor=Exposing+Vulnerabilities+in+Kubernetes&amp;index=5&amp;md5=158512e4c9d1f2f9588bf902d9f6542f\">Exposing Vulnerabilities in Kubernetes<br \/>\n<\/a><br \/>Wednesday, August 4 at 8:00 am PT<br \/>\n<br \/>Daniel Shapira, senior staff researcher\n<\/p>\n<p><a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fwww.blackhat.com%2Fus-21%2Fsponsored-sessions%2Fschedule%2F%23enemy-inside-the-gates--threat-landscape-key-findings-24507&amp;esheet=52469366&amp;newsitemid=20210802005148&amp;lan=en-US&amp;anchor=Enemy+Inside+the+Gates%3A+2020+Threat+Landscape+Key+Findings&amp;index=6&amp;md5=08175c02776b74e12a518a85a5e94411\">Enemy Inside the Gates: 2020 Threat Landscape Key Findings<br \/>\n<\/a><br \/>Wednesday, August 4 at 10:50 AM PT<br \/>\n<br \/>Chad Skipper, global security technologist<br \/>\n<br \/>Giovanni Vigna, senior director of threat intelligence\n<\/p>\n<p><a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fwww.blackhat.com%2Fus-21%2Fsponsored-sessions%2Fschedule%2F%23disrupting-ransomware-and-dismantling-the-cybercrime-ecosystem-24517&amp;esheet=52469366&amp;newsitemid=20210802005148&amp;lan=en-US&amp;anchor=Disrupting+Ransomware+and+Dismantling+the+Cybercrime+Ecosystem&amp;index=7&amp;md5=2b5f588d6875cf70eba95133ac10ff51\">Disrupting Ransomware and Dismantling the Cybercrime Ecosystem<br \/>\n<\/a><br \/>Wednesday, August 4 at 1:10 pm PT<br \/>\n<br \/>Tom Kellermann, head of cybersecurity strategy<br \/>\n<br \/>Rick McElroy, principal cybersecurity strategist\n<\/p>\n<p><a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fwww.blackhat.com%2Fus-21%2Fbriefings%2Fschedule%2Findex.html%23symbexcel-bringing-the-power-of-symbolic-execution-to-the-fight-against-malicious-excel--macros-22893&amp;esheet=52469366&amp;newsitemid=20210802005148&amp;lan=en-US&amp;anchor=Symbexcel%3A+Bringing+the+Power+of+Symbolic+Execution+to+the+Fight+Against+Malicious+Excel+4+Macros&amp;index=8&amp;md5=15e33741dae001c85d6dccfd6d47dd75\">Symbexcel: Bringing the Power of Symbolic Execution to the Fight Against Malicious Excel 4 Macros<br \/>\n<\/a><br \/>Wednesday, August 4 at 1:30 pm PT<br \/>\n<br \/>Giovanni Vigna, senior director of threat intelligence<br \/>\n<br \/>Stafano Ortolani, threat researcher\n<\/p>\n<p><a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fwww.blackhat.com%2Fus-21%2Fsponsored-sessions%2Fschedule%2Findex.html%23security-hygiene-for-devops-24508&amp;esheet=52469366&amp;newsitemid=20210802005148&amp;lan=en-US&amp;anchor=Security+Hygiene+for+DevOps&amp;index=9&amp;md5=beda032987cd15b1c5041bf7cee618e1\">Security Hygiene for DevOps<br \/>\n<\/a><br \/>Thursday, August 5 at 10:50 am PT<br \/>\n<br \/>Ram Akuka, product manager, Security Business Unit<br \/>\n<br \/>David Zendzian, global field CISO, VMware Tanzu\n<\/p>\n<p><a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fwww.blackhat.com%2Fus-21%2Fsponsored-sessions%2Fschedule%2F%23exposing-vulnerabilities-in-kubernetes-24506&amp;esheet=52469366&amp;newsitemid=20210802005148&amp;lan=en-US&amp;anchor=Exposing+Vulnerabilities+in+Kubernetes&amp;index=10&amp;md5=6055cdaea7068f67641252d5bee5d415\">Exposing Vulnerabilities in Kubernetes<br \/>\n<\/a><br \/>On-demand<br \/>\n<br \/>Daniel Shapira, senior staff researcher\n<\/p>\n<p><b>About VMware<\/b><\/p>\n<p>\nVMware software powers the world\u2019s complex digital infrastructure. The company\u2019s cloud, app modernization, networking, security, and digital workspace offerings help customers deliver any application on any cloud across any device. Headquartered in Palo Alto, California, VMware is committed to being a force for good, from its breakthrough technology innovations to its global impact. For more information, please visit <a rel=\"nofollow\" href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%3A%2F%2Fwww.vmware.com%2Fcompany.html&amp;esheet=52469366&amp;newsitemid=20210802005148&amp;lan=en-US&amp;anchor=https%3A%2F%2Fwww.vmware.com%2Fcompany.html&amp;index=11&amp;md5=cd65c88300b8b30f6fb1075ae0a20989\">https:\/\/www.vmware.com\/company.html<\/a><\/p>\n<p><img decoding=\"async\" alt=\"\" src=\"https:\/\/cts.businesswire.com\/ct\/CT?id=bwnews&amp;sty=20210802005148r1&amp;sid=flmnd&amp;distro=nx&amp;lang=en\" style=\"width:0;height:0\" \/><span class=\"bwct31415\" \/><\/p>\n<p id=\"mmgallerylink\"><span id=\"mmgallerylink-phrase\">View source version on businesswire.com: <\/span><span id=\"mmgallerylink-link\"><a href=\"https:\/\/www.businesswire.com\/news\/home\/20210802005148\/en\/\" rel=\"nofollow\">https:\/\/www.businesswire.com\/news\/home\/20210802005148\/en\/<\/a><\/span><\/p>\n<p>\nKerry Tuttle<br \/>\n<br \/>VMware Global Communications<br \/>\n<br \/><a rel=\"nofollow\" href=\"mailto:ktuttle@vmware.com\">ktuttle@vmware.com<br \/>\n<\/a><br \/>(470) 247-1987\n<\/p>\n<p>\nJessica Bettencourt<br \/>\n<br \/>Inkhouse<br \/>\n<br \/><a rel=\"nofollow\" href=\"mailto:jbettencourt@inkhouse.com\">jbettencourt@inkhouse.com<br \/>\n<\/a><br \/>(774) 451-5142\n<\/p>\n<p><b>KEYWORDS:<\/b> United States North America California<\/p>\n<p><b>INDUSTRY KEYWORDS:<\/b> Software Technology Internet Security<\/p>\n<p><b>MEDIA:<\/b><\/p>\n<table cellpadding=\"3\" cellspacing=\"3\">\n<tr>\n<td><font face=\"Arial\" size=\"2\"><b>Logo<\/b><\/font><\/td>\n<\/tr>\n<tr>\n<td><img decoding=\"async\" src=\"https:\/\/mms.businesswire.com\/media\/20210802005148\/en\/782362\/3\/4284573_300DPIxVMware-logo-grey_highres.jpg\" alt=\"Logo\" \/><\/td>\n<\/tr>\n<tr>\n<td><font face=\"Arial\" size=\"2\"><\/font><\/td>\n<\/tr>\n<tr>\n<td><font face=\"Arial\" size=\"2\"><b>Photo<\/b><\/font><\/td>\n<\/tr>\n<tr>\n<td><img decoding=\"async\" src=\"https:\/\/mms.businesswire.com\/media\/20210802005148\/en\/895378\/3\/VMWare_Threat_Report_social_Twitter_01.jpg\" alt=\"Photo\" \/><\/td>\n<\/tr>\n<tr>\n<td><font face=\"Arial\" size=\"2\">(Graphic: Business Wire)<\/font><\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals Manipulate Reality via Integrity and Destructive Attacks, VMware Report Finds Defenders fight back against weaponization of new technologies, industrialization of e-crime, and burnout PALO ALTO, Calif.&#8211;(BUSINESS WIRE)&#8211; At Black Hat USA 2021, VMware, Inc. (NYSE: VMW) released its seventh annual Global Incident Response Threat Report, which analyzes how attackers are manipulating reality to reshape the modern threat landscape. The report found a drastic rise in destructive attacks, where adversaries deploy advanced techniques to deliver more targeted, sophisticated attacks that distort digital reality, be it via business communications compromise (BCC) or the manipulation of time. This press release features multimedia. View the full release here: https:\/\/www.businesswire.com\/news\/home\/20210802005148\/en\/ (Graphic: Business Wire) \u201cToday, we\u2019re seeing a nexus between nation-states and cybercriminals continue to &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-manipulate-reality-via-integrity-and-destructive-attacks-vmware-report-finds\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Cybercriminals Manipulate Reality via Integrity and Destructive Attacks, VMware Report Finds&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-520996","post","type-post","status-publish","format-standard","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybercriminals Manipulate Reality via Integrity and Destructive Attacks, VMware Report Finds - Market Newsdesk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-manipulate-reality-via-integrity-and-destructive-attacks-vmware-report-finds\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybercriminals Manipulate Reality via Integrity and Destructive Attacks, VMware Report Finds - Market Newsdesk\" \/>\n<meta property=\"og:description\" content=\"Cybercriminals Manipulate Reality via Integrity and Destructive Attacks, VMware Report Finds Defenders fight back against weaponization of new technologies, industrialization of e-crime, and burnout PALO ALTO, Calif.&#8211;(BUSINESS WIRE)&#8211; At Black Hat USA 2021, VMware, Inc. (NYSE: VMW) released its seventh annual Global Incident Response Threat Report, which analyzes how attackers are manipulating reality to reshape the modern threat landscape. The report found a drastic rise in destructive attacks, where adversaries deploy advanced techniques to deliver more targeted, sophisticated attacks that distort digital reality, be it via business communications compromise (BCC) or the manipulation of time. This press release features multimedia. View the full release here: https:\/\/www.businesswire.com\/news\/home\/20210802005148\/en\/ (Graphic: Business Wire) \u201cToday, we\u2019re seeing a nexus between nation-states and cybercriminals continue to &hellip; Continue reading &quot;Cybercriminals Manipulate Reality via Integrity and Destructive Attacks, VMware Report Finds&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-manipulate-reality-via-integrity-and-destructive-attacks-vmware-report-finds\/\" \/>\n<meta property=\"og:site_name\" content=\"Market Newsdesk\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-02T10:03:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mms.businesswire.com\/media\/20210802005148\/en\/895378\/4\/VMWare_Threat_Report_social_Twitter_01.jpg\" \/>\n<meta name=\"author\" content=\"Newsdesk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Newsdesk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cybercriminals-manipulate-reality-via-integrity-and-destructive-attacks-vmware-report-finds\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cybercriminals-manipulate-reality-via-integrity-and-destructive-attacks-vmware-report-finds\\\/\"},\"author\":{\"name\":\"Newsdesk\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#\\\/schema\\\/person\\\/482f27a394d4fda80ecb5499e519d979\"},\"headline\":\"Cybercriminals Manipulate Reality via Integrity and Destructive Attacks, VMware Report Finds\",\"datePublished\":\"2021-08-02T10:03:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cybercriminals-manipulate-reality-via-integrity-and-destructive-attacks-vmware-report-finds\\\/\"},\"wordCount\":910,\"image\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cybercriminals-manipulate-reality-via-integrity-and-destructive-attacks-vmware-report-finds\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mms.businesswire.com\\\/media\\\/20210802005148\\\/en\\\/895378\\\/4\\\/VMWare_Threat_Report_social_Twitter_01.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cybercriminals-manipulate-reality-via-integrity-and-destructive-attacks-vmware-report-finds\\\/\",\"url\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cybercriminals-manipulate-reality-via-integrity-and-destructive-attacks-vmware-report-finds\\\/\",\"name\":\"Cybercriminals Manipulate Reality via Integrity and Destructive Attacks, VMware Report Finds - Market Newsdesk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cybercriminals-manipulate-reality-via-integrity-and-destructive-attacks-vmware-report-finds\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cybercriminals-manipulate-reality-via-integrity-and-destructive-attacks-vmware-report-finds\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mms.businesswire.com\\\/media\\\/20210802005148\\\/en\\\/895378\\\/4\\\/VMWare_Threat_Report_social_Twitter_01.jpg\",\"datePublished\":\"2021-08-02T10:03:20+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#\\\/schema\\\/person\\\/482f27a394d4fda80ecb5499e519d979\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cybercriminals-manipulate-reality-via-integrity-and-destructive-attacks-vmware-report-finds\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cybercriminals-manipulate-reality-via-integrity-and-destructive-attacks-vmware-report-finds\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cybercriminals-manipulate-reality-via-integrity-and-destructive-attacks-vmware-report-finds\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mms.businesswire.com\\\/media\\\/20210802005148\\\/en\\\/895378\\\/4\\\/VMWare_Threat_Report_social_Twitter_01.jpg\",\"contentUrl\":\"https:\\\/\\\/mms.businesswire.com\\\/media\\\/20210802005148\\\/en\\\/895378\\\/4\\\/VMWare_Threat_Report_social_Twitter_01.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/cybercriminals-manipulate-reality-via-integrity-and-destructive-attacks-vmware-report-finds\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybercriminals Manipulate Reality via Integrity and Destructive Attacks, VMware Report Finds\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#website\",\"url\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/\",\"name\":\"Market Newsdesk\",\"description\":\"Latest Business News in Real Time\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#\\\/schema\\\/person\\\/482f27a394d4fda80ecb5499e519d979\",\"name\":\"Newsdesk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g\",\"caption\":\"Newsdesk\"},\"url\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/author\\\/newsdesk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybercriminals Manipulate Reality via Integrity and Destructive Attacks, VMware Report Finds - Market Newsdesk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-manipulate-reality-via-integrity-and-destructive-attacks-vmware-report-finds\/","og_locale":"en_US","og_type":"article","og_title":"Cybercriminals Manipulate Reality via Integrity and Destructive Attacks, VMware Report Finds - Market Newsdesk","og_description":"Cybercriminals Manipulate Reality via Integrity and Destructive Attacks, VMware Report Finds Defenders fight back against weaponization of new technologies, industrialization of e-crime, and burnout PALO ALTO, Calif.&#8211;(BUSINESS WIRE)&#8211; At Black Hat USA 2021, VMware, Inc. (NYSE: VMW) released its seventh annual Global Incident Response Threat Report, which analyzes how attackers are manipulating reality to reshape the modern threat landscape. The report found a drastic rise in destructive attacks, where adversaries deploy advanced techniques to deliver more targeted, sophisticated attacks that distort digital reality, be it via business communications compromise (BCC) or the manipulation of time. This press release features multimedia. View the full release here: https:\/\/www.businesswire.com\/news\/home\/20210802005148\/en\/ (Graphic: Business Wire) \u201cToday, we\u2019re seeing a nexus between nation-states and cybercriminals continue to &hellip; Continue reading \"Cybercriminals Manipulate Reality via Integrity and Destructive Attacks, VMware Report Finds\"","og_url":"https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-manipulate-reality-via-integrity-and-destructive-attacks-vmware-report-finds\/","og_site_name":"Market Newsdesk","article_published_time":"2021-08-02T10:03:20+00:00","og_image":[{"url":"https:\/\/mms.businesswire.com\/media\/20210802005148\/en\/895378\/4\/VMWare_Threat_Report_social_Twitter_01.jpg","type":"","width":"","height":""}],"author":"Newsdesk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Newsdesk","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-manipulate-reality-via-integrity-and-destructive-attacks-vmware-report-finds\/#article","isPartOf":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-manipulate-reality-via-integrity-and-destructive-attacks-vmware-report-finds\/"},"author":{"name":"Newsdesk","@id":"https:\/\/www.marketnewsdesk.com\/#\/schema\/person\/482f27a394d4fda80ecb5499e519d979"},"headline":"Cybercriminals Manipulate Reality via Integrity and Destructive Attacks, VMware Report Finds","datePublished":"2021-08-02T10:03:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-manipulate-reality-via-integrity-and-destructive-attacks-vmware-report-finds\/"},"wordCount":910,"image":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-manipulate-reality-via-integrity-and-destructive-attacks-vmware-report-finds\/#primaryimage"},"thumbnailUrl":"https:\/\/mms.businesswire.com\/media\/20210802005148\/en\/895378\/4\/VMWare_Threat_Report_social_Twitter_01.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-manipulate-reality-via-integrity-and-destructive-attacks-vmware-report-finds\/","url":"https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-manipulate-reality-via-integrity-and-destructive-attacks-vmware-report-finds\/","name":"Cybercriminals Manipulate Reality via Integrity and Destructive Attacks, VMware Report Finds - Market Newsdesk","isPartOf":{"@id":"https:\/\/www.marketnewsdesk.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-manipulate-reality-via-integrity-and-destructive-attacks-vmware-report-finds\/#primaryimage"},"image":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-manipulate-reality-via-integrity-and-destructive-attacks-vmware-report-finds\/#primaryimage"},"thumbnailUrl":"https:\/\/mms.businesswire.com\/media\/20210802005148\/en\/895378\/4\/VMWare_Threat_Report_social_Twitter_01.jpg","datePublished":"2021-08-02T10:03:20+00:00","author":{"@id":"https:\/\/www.marketnewsdesk.com\/#\/schema\/person\/482f27a394d4fda80ecb5499e519d979"},"breadcrumb":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-manipulate-reality-via-integrity-and-destructive-attacks-vmware-report-finds\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-manipulate-reality-via-integrity-and-destructive-attacks-vmware-report-finds\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-manipulate-reality-via-integrity-and-destructive-attacks-vmware-report-finds\/#primaryimage","url":"https:\/\/mms.businesswire.com\/media\/20210802005148\/en\/895378\/4\/VMWare_Threat_Report_social_Twitter_01.jpg","contentUrl":"https:\/\/mms.businesswire.com\/media\/20210802005148\/en\/895378\/4\/VMWare_Threat_Report_social_Twitter_01.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/cybercriminals-manipulate-reality-via-integrity-and-destructive-attacks-vmware-report-finds\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.marketnewsdesk.com\/"},{"@type":"ListItem","position":2,"name":"Cybercriminals Manipulate Reality via Integrity and Destructive Attacks, VMware Report Finds"}]},{"@type":"WebSite","@id":"https:\/\/www.marketnewsdesk.com\/#website","url":"https:\/\/www.marketnewsdesk.com\/","name":"Market Newsdesk","description":"Latest Business News in Real Time","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.marketnewsdesk.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.marketnewsdesk.com\/#\/schema\/person\/482f27a394d4fda80ecb5499e519d979","name":"Newsdesk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g","caption":"Newsdesk"},"url":"https:\/\/www.marketnewsdesk.com\/index.php\/author\/newsdesk\/"}]}},"_links":{"self":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts\/520996","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/comments?post=520996"}],"version-history":[{"count":0,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts\/520996\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/media?parent=520996"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/categories?post=520996"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/tags?post=520996"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}