![]() An example is CrowdStrike’s acquisition of Reposify last year, announced at CrowdStrike’s annual Fal.Con event. Several vendors are either exploring or have acquired companies for strengthening their platforms against insider threats. Proofpoint’s ObserveIT gives real-time alerts and actionable insights into user activity. Proofpoint is another insider threat detection vendor that uses AI and machine learning. Booz Allen Hamilton uses data mesh architecture and machine learning algorithms to detect, monitor and respond to suspicious network activity. That’s why leading vendors with AI and machine learning expertise have insider threat mitigation on their roadmaps. CISOs tell VentureBeat that insider attacks are their worst nightmare because identifying and stopping these kinds of breaches is so challenging. One out of every five breaches, 19%, originate from the inside. But the year before that, the 2021 DBIR found that just 35% of successful breaches started that way. In last year’s report the figure was an even higher 82%. According to this year’s report, 74% of breaches began through human error, social engineering or misuse. According to the last two Verizon DBIR reports, many breaches involve human error. And people have become the initial threat surface of choice, with pretexting, coordinated with social engineering, the initial attack strategy.Įighty-four percent of breaches target humans as the attack vector, using social engineering and BEC strategies. The financial services and manufacturing sectors top attackers’ hit lists, as these businesses must deliver products and services on time to keep customers and survive. Smash-and-grab attacks on customer and financial data are commonplace, with ransomware the weapon of choice. Organized crime gangs and networks initiate eight out of every 10 breaches, 95% of the time for financial gain. Here are the top 10 key takeaways of the Verizon 2023 DBIR:Įighty-three percent of breaches are initiated by external attackers looking for quick financial gain. Verizon found stolen credential use increased from 41.6% to 44.7% of all breaches in just a year. Stolen privileged access credentials continue to be a favorite way for attackers to gain access to systems and blend into regular system traffic undetected. Kindervag advised enterprises not to protect all surfaces simultaneously, but to opt instead for an iterative approach, telling VentureBeat that this is a proven way to scale zero trust without asking the board to fund a capital equipment-level investment.Īttackers’ fine-tuned strategies are getting into victims’ heads and shortening the time from initial contact to when a target actually falls victim. Getting basic cybersecurity hygiene right at scale and enforcing zero trust incrementally, protecting one surface at a time, is what cybersecurity expert John Kindervag advised organizations to start with during a recent interview with VentureBeat. Instead, companies would be more secure if they first assumed a breach would happen, then took preventative measures before one did. The answer to this challenge isn’t to double spending on training or, worse, continue the ineffective practice of trying to trick employees with fake phishing emails. One of the most powerful takeaways from the report is that despite increased spending, cybersecurity is not pivoting fast enough to protect people from advanced pretexting attacks. ![]() According to Internet Crime Complaint Center (IC3) data, the median theft amount for BEC has increased to $ 50,000. The well-known gift card scam has become so commonplace that the Federal Trade Commission published guidance on how to avoid it. VentureBeat has learned of dozens of tech companies routinely attacked with pretexting as part of orchestrated social engineering attacks. ![]() ![]() We often want to help colleagues, friends and family when they request cash or other forms of financial help. Verizon’s 2023 Data Breach Investigations Report (DBIR) reflects how fast the threatscape is evolving to prey on people’s good nature. Attackers are finding new ways to dupe victims for dollars Organizations must move beyond training and act to provide a strong defense baseline. Every cybersecurity provider needs to step up efforts to improve identity, privileged access, and endpoint security to deliver the value their customers need. Attackers are capitalizing on stolen credentials, privilege misuse, human error, well-orchestrated social engineering, business email compromise (BEC) and, doubling in just a year, pretexting. Statistics from 2022 and into 2023 show the cybersecurity industry has more work to do to people-proof attack vectors. Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. ![]()
0 Comments
Leave a Reply. |