Phone : +91 95 8290 7788 | Email : sales@itmonteur.net

Register & Request Quote | Submit Support Ticket

Home » Cyber Security News » Vulnerabilities & Exploits » Zero-day vulnerabilities becoming major source of cyberattacks: Verizon – ET CISO

Zero-day vulnerabilities becoming major source of cyberattacks: Verizon – ET CISO

Zero-day vulnerabilities becoming major source of cyberattacks: Verizon – ET CISO

https://etimg.etb2bimg.com/thumb/msid-109773721,imgsize-874584,width-1200,height=765,overlay-etciso/corporate/zero-day-vulnerabilities-becoming-major-source-of-cyberattacks-verizon.jpg


Cyberattacks stemming from exploitation of vulnerabilities for accessing data have shot up by a staggering 180% in 2023 and almost tripled over the past year, a new study has revealed.

The growth is majorly fueled by the MOVEit vulnerability where hackers exploited a zero-day vulnerability in the MOVEit file-transfer software to steal sensitive medical and health information data of nearly 4 million Americans.

This also marks a decline in dependency on stolen credentials as a percentage of initial actions in data breaches, although it still remains the top category.

The big shift in cyberattack motives has happened towards extortion, Verizon Business showed in the 17th edition of its Data Breach Investigations Report 2023.

Out of all breaches in 2023, 32% involved some type of extortion technique, including ransomware. The median loss associated with financially motivated incidents involving ransomware or extortion of some kind was $46,000.

On the concerns around generative artificial intelligence (GenAI) fuelling cyberattacks, Verizon maintained that its use in criminal forums remained limited to AI-generated pornography.

“The number of mentions of GenAI terms alongside traditional attack types and vectors such as “phishing,” “malware,” “vulnerability” and “ransomware” were shockingly low, barely breaching 100 cumulative mentions over the past two years,” it said, adding that threat actors are still experimenting with GenAI tools such as “learning how to code” by known state-sponsored threat actors.

However, deepfakes are a cause of concern when it comes to frauds and spread of misinformation.

The study further showed that 68% of all breaches involved a non-malicious human element, caused by a person who either fell victim to a social engineering attack or made some type of error. 15% of breaches involved a third party, including data custodians or hosting partner infrastructures being breached and direct or indirect software supply chain issues.

The study recorded more than 30,000 incidents of data breaches with victims spanning 94 countries.

  • Published On May 2, 2024 at 10:53 AM IST

Join the community of 2M+ industry professionals

Subscribe to our newsletter to get latest insights & analysis.

Download ETCISO App

  • Get Realtime updates
  • Save your favourite articles


Scan to download App

Information Security - InfoSec - Cyber Security - Firewall Providers Company in India

 

 

 

 

 

 

 

 

 

 

 

 

What is Firewall? A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies. At its most basic, a firewall is essentially the barrier that sits between a private internal network and the public Internet.

 

Secure your network at the gateway against threats such as intrusions, Viruses, Spyware, Worms, Trojans, Adware, Keyloggers, Malicious Mobile Code (MMC), and other dangerous applications for total protection in a convenient, affordable subscription-based service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services. Stateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols.

 

Firewall Firm is an IT Monteur Firewall Company provides Managed Firewall Support, Firewall providers , Firewall Security Service Provider, Network Security Services, Firewall Solutions India , New Delhi - India's capital territory , Mumbai - Bombay , Kolkata - Calcutta , Chennai - Madras , Bangaluru - Bangalore , Bhubaneswar, Ahmedabad, Hyderabad, Pune, Surat, Jaipur, Firewall Service Providers in India

Sales Number : +91 95 8290 7788 | Support Number : +91 94 8585 7788
Sales Email : sales@itmonteur.net | Support Email : support@itmonteur.net

Register & Request Quote | Submit Support Ticket