
[ad_1]
Companies are moving faster when it comes to addressing cyber threats, but that may not be enough to keep up with everyday attacks.
Securonik recently released the results of its 2022 Threat Report, highlighting a significant increase (up 485%) in advanced cyber threats identified and scanned by the company.
The report found that a combination of persistent insider threats, misuse and abuse of cloud infrastructure, and sophisticated advanced attacks has fueled a riskier environment for companies.
As corporate networks expand to the cloud to support a distributed workforce, threat actors are taking advantage of the security gaps presented by this expanded attack surface. Research by Securonik found that indicators of compromise (IOC) increased by 380% year-over-year, and the number of threats detected, analyzed and reported increased by 218% during that time.
It also found that new vulnerabilities are being identified almost twice as fast as in 2021. In response to the increase in the number of detected global threats, Securonik Autonomous Threat Sweeper (ATS) distributed 482% more threat awareness notifications to subscribers than it did. one year ago.
“We have seen a significant increase in the number of threats since the beginning of the year, and the four areas that have been persistently active in the last 12 months are insider threats, cloud infrastructure, ransomware attacks and IoT/OT attacks,” explained Kaizad Vanskuivala, director of cyber hunting threats and intelligence services at Securonik.
According to Threat Report 2022, increased reliance on cloud infrastructure has caused insiders to modernize their approach to data exfiltration. Research by Securonik found that, amid the growing use of cloud storage and sharing platforms, email (68%) and content management products (68%) are the main exit vectors.
As businesses strive to balance the benefits of cloud computing with the risks, misuse of cloud infrastructure remains a major concern. The report found that users remain the primary cause of potential risk to cloud infrastructure, with challenges ranging from inadvertent platform modifications to inconsistently assigned privileges.
“The rise of global threats presents an increasingly challenging landscape for businesses and the public,” said Sina Chereghani, manager of threat detection and incident response at Securonik.
“The evidence in our research strongly suggests that companies need to rethink anomalous user behavior and disclosure coverage to effectively respond to insider threats and the increasing risks posed by cloud infrastructure adoption.” Furthermore, using proactive detection strategies can stop attackers earlier in the kill chain in ransomware attacks, while combining key data sources to look for unusual behavior ensures more robust threat detection and response in IoT and OT environments,” added Chereghani.
Image credit: iStockphoto/razihusin
[ad_2]
Source link