Jamaica Under Cyberattack: 30 Million Attempts in 6 Months!
Sep 16, 2025
Jamaica faces a surge in cyberattacks, with over 34 million attempts in the first six months of 2025. The Fortinet report highlights the urgent need for stronger cyber defenses against evolving AI-driven threats targeting critical sectors. Simple steps can reduce attacks. #cybersecurity #Jamaica #cyberattack #AI #threatlandscape
View Video Transcript
0:00
[Music]
0:03
Welcome back to Prime Time News
0:04
and a special welcome once again to our
0:06
viewers on TVJ International in the
0:08
Cayman Islands and online at
0:09
onesspotmedia.com.
0:11
We begin this evening with a startling
0:13
revelation. Jamaica recorded more than
0:16
30 million cyber attack attempts in just
0:20
the first 6 months of 2025. That's
0:23
according to the latest Forinet Global
0:26
Threat Landscape report. Now it says the
0:28
findings highlight the urgent need for
0:31
stronger defenses to protect the
0:33
country's critical infrastructure as
0:35
attackers increasingly target sectors
0:37
such as manufacturing,
0:39
telecommunications, healthcare, and
0:41
financial services.
0:42
Roard Lions has details.
0:45
34 million. That's how many attempts of
0:48
cyber attacks Jamaica recorded in the
0:50
first 6 months of 2025.
0:53
34 million attempts in 181 days. The
0:57
data was revealed in the latest Forinet
0:59
Global Threat Landscape report. It says
1:02
in the same six-month period, 4 million
1:04
active scans were detected. These scans
1:07
are networks being probed and tested by
1:09
attackers at a staggering pace of 36,000
1:13
attempts per second worldwide, helping
1:15
cyber criminals identify weak points
1:17
they can exploit. And artificial
1:19
intelligence AI has been creating more
1:22
loopholes in the cyber security
1:23
landscape. Attackers are leveraging
1:25
tools like Fraud GPT and Worm GPT to
1:29
quickly generate convincing fishing
1:31
emails and carry out social engineering
1:33
schemes. IT expert Craig Pow says it's
1:36
easy. I think anybody who is 13 years
1:39
old today in Jamaica who has a phone, a
1:42
iPhone or Android would have the ability
1:44
to to do the thing because if you're on
1:47
Tik Tok or you're on Instagram and
1:49
you've seen any of those prank calls
1:50
with fake voices, it doesn't take much
1:53
intelligence to do it because there's
1:55
systems right now that you can go on for
1:56
free.
1:57
And how difficult is it for an
1:58
individual to know? I think it's really
2:01
really hard because the problem with the
2:03
internet is that anyone can say anything
2:06
and if somebody who has authority in
2:08
real life says something and it looks
2:10
like him, it sounds like him or her and
2:12
the average person just scrolling by
2:14
within a bunch of videos that are real.
2:17
In the context of seeing a bunch of real
2:19
things and then I see a fake thing, I
2:20
might not be able to tell.
2:21
Now, an even bigger issue, cyber
2:23
criminals aren't stealing data. Instead,
2:26
they're shutting down services and
2:28
making demands like this.
2:30
All your files are encrypted. Pay
2:32
$10,000 or lose everything.
2:34
This was Dale Joseph, cyber crime policy
2:36
specialist at the Caraccom
2:38
implementation agency for crime and
2:40
security in 2022.
2:42
I I would con consider them um
2:45
simple attacks and they lose a lot of
2:47
money. Um so it's it's important that we
2:51
just follow the simple ABC rules. um
2:55
verify everything going forward and that
2:57
in in from from our perspective is
3:00
actually going to reduce some of the um
3:03
these these attacks that
3:04
it's recommended that at the basic level
3:06
organizations close security gaps,
3:08
enforce multiffactor authentication and
3:11
manage user credentials carefully. In
3:13
the meantime, the JN group is urging
3:16
Gmail users to strengthen their account
3:18
security and adopt safer login
3:20
practices. The warning follows Google's
3:22
recent alert to its 2.5 billion users
3:26
about a breach and the potential for
3:28
increased hacking attempts exploiting
3:30
its exposed business contact
3:32
information. Even though passwords were
3:34
uncompromised, attackers can use the
3:36
leak data to do harm. Attackers will
3:39
generally send email that looks
3:41
legitimate with users details. They can
3:44
craft urgent or personalized messages,
3:46
increasing the likelihood that these
3:48
users will let down their cards. Ramardo
3:50
Lions, TVJ News.
4:03
[Music]
#Computers & Electronics
#Internet & Telecom
#Local News
#Technology News

