{"id":42873,"date":"2021-09-16T00:00:00","date_gmt":"2021-09-16T00:00:00","guid":{"rendered":"https:\/\/www.trendmicro.com\/en_us\/research\/21\/i\/midyear-2021-cybersecurity-landscape-review.html"},"modified":"2021-09-16T00:00:00","modified_gmt":"2021-09-16T00:00:00","slug":"midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/","title":{"rendered":"Midyear 2021 Cybersecurity Landscape Review: Attacks From All Angles Abound"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/i\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/midyear-roundup-2021-blog-banner.jpg\"><!-- Begin mPulse library --><!-- END mPulse library --> <head> <meta charset=\"UTF-8\"> <meta name=\"viewport\" content=\"width=device-width\"> <meta name=\"description\" content=\"Here is a rundown of data related to the crucial security issues that enterprises faced during this period, as examined in our report, \u201cAttacks From All Angles: 2021 Midyear Cybersecurity Report.\u201d\"> <meta name=\"robots\" content=\"index,follow\"> <meta name=\"keywords\" content=\"ransomware,exploits &amp; vulnerabilities,reports,articles, news, reports,cyber threats\"> <meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge,chrome=1\"> <meta name=\"template\" content=\"article1withouthero\"> <meta property=\"article:published_time\" content=\"2021-09-16\"> <meta property=\"article:tag\" content=\"cyber threats\"> <meta property=\"article:section\" content=\"reports\"> <link rel=\"icon\" type=\"image\/ico\" href=\"\/content\/dam\/trendmicro\/favicon.ico\"> <link rel=\"canonical\" href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/i\/midyear-2021-cybersecurity-landscape-review.html\"> <title>Midyear 2021 Cybersecurity Landscape Review: Attacks From All Angles Abound<\/title> <link href=\"https:\/\/fonts.googleapis.com\/css?family=Open+Sans:300,300i,400,400i,600\" rel=\"stylesheet\">\n<link href=\"\/\/customer.cludo.com\/css\/296\/1798\/cludo-search.min.css\" type=\"text\/css\" rel=\"stylesheet\"> <link rel=\"stylesheet\" href=\"\/etc.clientlibs\/trendresearch\/clientlibs\/clientlib-trendresearch.min.css\" type=\"text\/css\"> <meta property=\"og:url\" content=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/i\/midyear-2021-cybersecurity-landscape-review.html\"><br \/>\n<meta property=\"og:title\" content=\"Midyear 2021 Cybersecurity Landscape Review: Attacks From All Angles Abound\"><br \/>\n<meta property=\"og:description\" content=\"Here is a rundown of data related to the crucial security issues that enterprises faced during this period, as examined in our report, \u201cAttacks From All Angles: 2021 Midyear Cybersecurity Report.\u201d\"><br \/>\n<meta property=\"og:site_name\" content=\"Trend Micro\"><br \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/i\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/midyear-roundup-2021-blog-banner.jpg\"><br \/>\n<meta property=\"og:locale\" content=\"en_US\"> <meta name=\"twitter:card\" content=\"summary_large_image\"><br \/>\n<meta name=\"twitter:site\" content=\"@TrendMicro\"><br \/>\n<meta name=\"twitter:title\" content=\"Midyear 2021 Cybersecurity Landscape Review: Attacks From All Angles Abound\"><br \/>\n<meta name=\"twitter:description\" content=\"Here is a rundown of data related to the crucial security issues that enterprises faced during this period, as examined in our report, \u201cAttacks From All Angles: 2021 Midyear Cybersecurity Report.\u201d\"><br \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/i\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/midyear-roundup-2021-blog-banner.jpg\"> <\/head> <body class=\"articlepage page basicpage context-business\" id=\"readabilityBody\" readability=\"48.524703178859\"> <!-- Page Scroll: Back to Top --> <a id=\"page-scroll\" title=\"VerticalPageScroll\" href=\"javascript:jumpScroll($(this).scrollTop());\"> <span class=\"icon-chevron-up\"><\/span> <\/a> <!-- \/* Data Layer *\/ --> <\/p>\n<div class=\"root responsivegrid\">\n<div class=\"aem-Grid aem-Grid--12 aem-Grid--default--12 \">\n<div class=\"articleBodyNoHero aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"research-layout article container\" role=\"contentinfo\">\n<article class=\"research-layout--wrapper row\" data-article-pageid=\"1534480384\">\n<div class=\"col-xs-12 col-md-12 one-column\">\n<div class=\"col-xs-12 col-md-12\" readability=\"9.2695417789757\">\n<div class=\"article-details\" role=\"heading\" readability=\"38.053908355795\"> <span class=\"article-details__bar\" role=\"img\"><\/span> <\/p>\n<p class=\"article-details__display-tag\">Cyber Threats<\/p>\n<p class=\"article-details__description\">Here is a rundown of data related to the crucial security issues that enterprises faced during this period, as examined in our report, \u201cAttacks From All Angles: 2021 Midyear Cybersecurity Report.\u201d<\/p>\n<p class=\"article-details__author-by\">By: Trend Micro <time class=\"article-details__date\">September 16, 2021<\/time> <span>Read time:&nbsp;<\/span><span class=\"eta\"><\/span> (<span class=\"words\"><\/span> words) <\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<hr class=\"research-layout-divider\"> <main class=\"main--content col-xs-12 col-md-8 col-md-push-2\"> <\/p>\n<div class=\"richText\" readability=\"44.562730627306\">\n<div readability=\"38.590405904059\">\n<p>As enterprises move toward the rest of the year, it is helpful to look back and learn from key cybersecurity incidents that shaped the first half of 2021.<\/p>\n<p>Threat actors and <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/Ransomware\">ransomware<\/a> operators bombarded the security landscape with one major attack after another, making it difficult for affected enterprises and their customers to recover amid the current pandemic.<\/p>\n<p>In total, nearly 41 billion threats were blocked and detected across files, emails, and URLs in the first six months of the year. The following is a rundown of data related to the crucial security issues that enterprises faced during this period, as examined in our report, \u201c<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/threat-reports\/roundup\/attacks-from-all-angles-2021-midyear-security-roundup\">Attacks From All Angles: 2021 Midyear Cybersecurity Report<\/a>.\u201d<\/p>\n<h2><span class=\"body-subhead-title\">Ransomware operators aim at high-profile targets<\/span><\/h2>\n<p>Ransomware detections decreased by more than half, from over 14 million in the first half of 2020 to over 7 million in the same period this year. However, this does not necessarily mean that ransomware is no longer a pressing security issue; in fact, ransomware continues to mutate into a more vicious threat. This shows how attackers are moving from the opportunistic and quantity-focused model to more targeted modern ransomware methods and big-game hunting.<\/p>\n<p>Both premodern and modern ransomware are among the top 10 most detected for the first half of this year. The premodern ransomware WannaCry (aka WCry) still tops the list, although detections for it significantly dipped. On the other hand, detections for <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/modern-ransomwares-double-extortion-tactics-and-how-to-protect-enterprises-against-them\">modern ransomware<\/a> such as <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/e\/what-we-know-about-darkside-ransomware-and-the-us-pipeline-attac.html\">DarkSide<\/a>, <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/a\/sodinokibi-ransomware.html\">REvil<\/a> (aka Sodinokibi), and <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/f\/nefilim-modern-ransomware-attack-story.html\">Nefilim<\/a> increased, as operators continue to enhance their <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/locked-loaded-and-in-the-wrong-hands-legitimate-tools-weaponized-for-ransomware-in-2021\">techniques<\/a> and <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/ransomware-double-extortion-and-beyond-revil-clop-and-conti\">extortion schemes<\/a>.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/i\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/Figure-1-The-differences-in-modern-and-premodern-ransomware.jpg\" alt=\"Figure 1. The differences in modern and premodern ransomware\"><figcaption>Figure 2. The differences in modern and premodern ransomware<\/figcaption><\/figure>\n<\/p><\/div>\n<div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/i\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/Figure-2-File-only-count-midyear-roundup-ransomware-family-detections.png\" alt=\"Figure 2. File-only count ransomware family detections during the first half of 2020 compared to the first half of 2021 (Source: Trend Micro\u2122 Smart Protection Network\u2122 infrastructure)\"><figcaption>Figure 2. File-only count ransomware family detections during the first half of 2020 compared to the first half of 2021 (Source: Trend Micro\u2122 Smart Protection Network\u2122 infrastructure)<\/figcaption><\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"42.429708222812\">\n<div readability=\"30.588859416446\">\n<p>It is evident that ransomware operators continue to view critical industries as lucrative targets. In the first half of the year, the banking, government, manufacturing, healthcare, food and beverage, education, technology, financial, telecommunication, and retail industries were the &nbsp;most affected by ransomware.&nbsp;Alongside this, 49 new ransomware families emerged, showing how ransomware continues to expand as a threat.<\/p>\n<h2><span class=\"body-subhead-title\">Vulnerabilities<\/span><\/h2>\n<p>Compared to the same period last year, the number of new vulnerabilities in the first half of 2021 slightly decreased, with a huge dip in the volume of critical flaws. Despite this, the first six months of the year were marked with significant vulnerability exploitation incidents, such as the <a href=\"https:\/\/www.trendmicro.com\/en_ph\/devops\/21\/d\/could-the-microsoft-exchange-breach-be-stopped.html\">ProxyLogon<\/a> attacks.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/i\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/Figure-3-Midyear-roundup-vulnerabilities-breakdown.jpg\" alt=\"Figure 3. A comparison of the severity breakdown, based on the CVSS, of vulnerabilities in the first half of 2020 and 2021 (Source: Trend Micro Zero Day Initiative (ZDI) program)\"><figcaption>Figure 3. A comparison of the severity breakdown, based on the CVSS, of vulnerabilities in the first half of 2020 and 2021 (Source: Trend Micro Zero Day Initiative (ZDI) program)<\/figcaption><\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"32.35546875\">\n<div readability=\"10.78515625\">\n<p>Operating systems such as Windows and <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/linux-threat-report-2021-1h-linux-threats-in-the-cloud-and-security-recommendations\">Linux<\/a> continued to be plagued by both known and new vulnerabilities. These flaws can serve as entry points for various threats such as ransomware and other malware types including coinminers, web shells, and trojans.&nbsp;<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/i\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/Figure-4-Top-10-OS-according-to-malware-detection.jpg\" alt=\"Figure 4. The top 10 operating systems according to malware detection\"><figcaption>Figure 4. The top 10 operating systems according to malware detection<\/figcaption><\/figure>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/i\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/Figure-5-Top-5-malware-families-midyear.jpg\" alt=\"Figure 5. The top five malware families found in Linux systems from January 1 to June 30, 2021\"><figcaption>Figure 5. The top five malware families found in Linux systems from January 1 to June 30, 2021<\/figcaption><\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"35.046838407494\">\n<div readability=\"17.28337236534\">\n<h2><span class=\"body-subhead-title\">Covid-19-related threats<\/span><\/h2>\n<p>Threats that use the pandemic as bait continued to propagate through malicious files, emails, and websites in the first six months, although they decreased by over a half compared to the same period last year. In particular, <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/c\/injecting-deception-covid-19-vaccine-related-threats.html\">Covid-19 vaccines<\/a> and &nbsp;inoculation programs serve as common lures for these scams. The countries most affected by these threats are the US, Germany, Colombia, Italy, and Spain.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/i\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/Figure-6-Midyear-Roundup-Covid-threats-by-layer.jpg\" alt=\"Figure 6. Comparison of Covid-19-related email threats, URLs, and malware in the first half of 2020 and the first half of 2021\"><figcaption>Figure 6. Comparison of Covid-19-related email threats, URLs, and malware in the first half of 2020 and the first half of 2021<\/figcaption><\/figure>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/i\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/Figure-7-Midyear-Covid-threats-by-country.jpg\" alt=\"Figure 7. The top countries affected by Covid-19-related threats in the first half of 2021\"><figcaption>Figure 7. The top countries affected by Covid-19-related threats in the first half of 2021<\/figcaption><\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"30.284565916399\">\n<div readability=\"12.289389067524\">\n<p>With regard to specific threats, overall, <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/defending-systems-against-cryptocurrency-miner-malware\">cryptocurrency miners<\/a> became the most detected malware during this period, replacing the <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/wannacry-wcry-ransomware-how-to-defend-against-it\">WannaCry<\/a> ransomware in the top spot. The third most detected malware, <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/a\/targeted-attack-using-chopper-aspx-web-shell-exposed-via-managed.html\">web shell<\/a>, is commonly used by threat actors to enable remote access to compromised web servers.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/i\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/Figure-8-Midyear-most-detected-malware-families.jpg\" alt=\"Figure 8. Cryptocurrency miners were the most detected malware, with long-running family WannaCry in the second spot: The 10 most detected malware families in the first half of 2021\"><figcaption>Figure 8. Cryptocurrency miners were the most detected malware, with long-running family WannaCry in the second spot: The 10 most detected malware families in the first half of 2021<\/figcaption><\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"28.368975903614\">\n<div readability=\"11.512048192771\">\n<p>In sum, cybercriminals continue to raise the stakes for the enterprises and organizations that they target, as they launch attacks from all angles. To detect and block threats from all fronts, a multilayered defense is necessary. Learn more in our midyear report, \u201c<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/threat-reports\/roundup\/attacks-from-all-angles-2021-midyear-security-roundup\">Attacks From All Angles: 2021 Midyear Cybersecurity Report.<\/a>\u201d<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"jwPlayer\">\n<p> <iframe loading=\"lazy\" class=\"videos\" src=\"https:\/\/www.youtube.com\/embed\/Dmf8sa2JNXI?autoplay=0&amp;controls=0&amp;showinfo=0&amp;rel=0&amp;loop=1&amp;playlist=Dmf8sa2JNXI&amp;enablejsapi=1\" width=\"100%\" height=\"500\" frameborder=\"0\">[embedded content]<\/iframe> <\/p>\n<\/p><\/div>\n<\/p><\/div>\n<section class=\"tag--list\">\n<p>Tags<\/p>\n<\/section>\n<p> <\/main> <\/article>\n<\/div>\n<\/div><\/div>\n<\/div>\n<p> <!-- \/* Core functionality javascripts, absolute URL to leverage Akamai CDN *\/ --> <!--For Modal-start--> <\/p>\n<p> <span>sXpIBdPeKzI9PC2p0SWMpUSM2NSxWzPyXTMLlbXmYa0R20xk<\/span> <\/p>\n<p> <!--For Modal-end--> <!-- Go to www.addthis.com\/dashboard to customize your tools --> <\/body> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/i\/midyear-2021-cybersecurity-landscape-review.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here is a rundown of data related to the crucial security issues that enterprises faced during this period, as examined in our report, \u201cAttacks From All Angles: 2021 Midyear Cybersecurity Report.\u201d Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":42874,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,9511,9555,9539,9516],"class_list":["post-42873","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-cyber-threats","tag-trend-micro-research-exploitsvulnerabilities","tag-trend-micro-research-ransomware","tag-trend-micro-research-reports"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Midyear 2021 Cybersecurity Landscape Review: Attacks From All Angles Abound 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Midyear 2021 Cybersecurity Landscape Review: Attacks From All Angles Abound 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-16T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2420\" \/>\n\t<meta property=\"og:image:height\" content=\"1108\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Midyear 2021 Cybersecurity Landscape Review: Attacks From All Angles Abound\",\"datePublished\":\"2021-09-16T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/\"},\"wordCount\":774,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound.jpg\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Cyber Threats\",\"Trend Micro Research : Exploits&amp;Vulnerabilities\",\"Trend Micro Research : Ransomware\",\"Trend Micro Research : Reports\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/\",\"name\":\"Midyear 2021 Cybersecurity Landscape Review: Attacks From All Angles Abound 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound.jpg\",\"datePublished\":\"2021-09-16T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound.jpg\",\"width\":2420,\"height\":1108},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Midyear 2021 Cybersecurity Landscape Review: Attacks From All Angles Abound\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Midyear 2021 Cybersecurity Landscape Review: Attacks From All Angles Abound 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/","og_locale":"en_US","og_type":"article","og_title":"Midyear 2021 Cybersecurity Landscape Review: Attacks From All Angles Abound 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-09-16T00:00:00+00:00","og_image":[{"width":2420,"height":1108,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Midyear 2021 Cybersecurity Landscape Review: Attacks From All Angles Abound","datePublished":"2021-09-16T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/"},"wordCount":774,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound.jpg","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Cyber Threats","Trend Micro Research : Exploits&amp;Vulnerabilities","Trend Micro Research : Ransomware","Trend Micro Research : Reports"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/","url":"https:\/\/www.threatshub.org\/blog\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/","name":"Midyear 2021 Cybersecurity Landscape Review: Attacks From All Angles Abound 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound.jpg","datePublished":"2021-09-16T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound.jpg","width":2420,"height":1108},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/midyear-2021-cybersecurity-landscape-review-attacks-from-all-angles-abound\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"Midyear 2021 Cybersecurity Landscape Review: Attacks From All Angles Abound"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42873","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=42873"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42873\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/42874"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=42873"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=42873"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=42873"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}