Facing Today’s Cybersecurity Threats in Latin America and the Caribbean

23/06/2025

Facing Today’s Cybersecurity Threats in Latin America and the Caribbean

By Graciela Martínez, Head of LACNIC CSIRT

Cybersecurity, defined as the collective effort to secure cyberspace and prevent cyber threats, is now more complex than ever. Protecting our systems, data, and infrastructure is no longer optional; it is an absolute necessity.

Six Key Challenges to Achieving Effective Cyber Protection

Several factors are making it increasingly difficult to ensure strong and effective cybersecurity. Among the most significant are:

(Free access, no subscription required)

  1. Lack of Skilled Personnel. Many organizations still lack teams with the expertise and technical skills required to properly manage cyber risks and respond to incidents.
  1. Emerging Technologies. The rise of artificial intelligence and other emerging tools is creating new opportunities—not only for innovation, but also for more advanced and targeted cyberattacks.
  2. Complex and Inconsistent Regulations. While regulations play a key role in managing risks, keeping up with diverse and evolving legal frameworks is no easy task. Inconsistent regulations across jurisdictions make it difficult to manage security incidents efficiently.
  3. Supply Chain Interdependence. An increasing number of digital products rely on components from multiple third-party providers. A single vulnerability in one of them can compromise the entire system. This is a major concern for organizations, as these are external factors beyond their direct control.
  4. More Sophisticated Cybercrime. Cyberattacks are becoming increasingly complex, often enhanced by the use of artificial intelligence. They range from advanced financial fraud and identity theft to the exfiltration of sensitive data. Security teams face an ongoing challenge in detecting and analyzing these evolving threats, as they must constantly adapt to shifting patterns and increasingly evasive techniques.
  5. Geopolitical Tensions. International relations also influence cybersecurity: they hinder cooperation, impose technological restrictions, and shift national priorities—factors that directly affect cybersecurity strategies.

The Rising Cost of Cybercrime

In the last five years, the global financial impact of cybercrime has tripled. Yet many organizations remain underprepared in the face of escalating cyber threats. In Latin America and the Caribbean, only 2 out of 10 organizations consider themselves truly prepared to respond effectively to a cyberattack.

Most Common Cyber Threats

Cyber threats target both on-premises and cloud infrastructure alike—no environment is exempt from risk. According to Statista and incident data from LACNIC’s CSIRT, the most frequently reported threats this year include:

  • Phishing (involved in 74% of reported cases)
    Phishing is a social engineering technique used by attackers to deceive users into sharing sensitive information—such as login credentials, credit card details, or banking data. These messages often arrive via email, messaging apps, or social networks, and are crafted to appear as if they come from trusted sources, like banks, online platforms, or even personal contacts. The aim is to persuade the recipient to click on a malicious link or download a file that compromises the security of their device.
  • Credential Theft
    This occurs when attackers gain unauthorized access to usernames and passwords. Stolen credentials may be used to breach personal or corporate accounts and are often sold on underground markets. They are commonly obtained through phishing, keyloggers, poorly secured databases, or the reuse of weak passwords across different services.
  • Ransomware
    Ransomware is malicious software that, once installed, encrypts a user’s or an organization’s files, making them inaccessible. Attackers then demand a ransom—usually in cryptocurrency—in exchange for the decryption key. This type of malware spreads through infected attachments, malicious links, or unpatched vulnerabilities. It can have serious consequences, particularly for organizations that rely on constant access to their data and systems.
  • Info Stealers
    As covered in a previous blog post, info stealers are a type of malware that infiltrate systems to steal passwords, tokens, and other credentials—then self-destruct, leaving minimal traces behind. These stolen credentials are often sold on illicit markets and later used to carry out fraud schemes, increasingly supported by artificial intelligence.

What Can We Do to Strengthen Cybersecurity?

Cybersecurity is no longer the sole responsibility of IT departments. Today, it requires a comprehensive approach—one that combines ongoing training, proper risk mapping, sustained investment, organizational awareness, and international cooperation.

The views expressed by the authors of this blog are their own and do not necessarily reflect the views of LACNIC.

Subscribe
Notify of

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments