04.07.2022 Views

Cyber Defense eMagazine July Edition for 2022

Cyber Defense eMagazine July Edition for 2022 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine July Edition for 2022 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The Numbers Are In: Identity-Based Attacks (Still) Reign<br />

Supreme in <strong>2022</strong><br />

By Greg Notch, CISO, Expel<br />

The list of challenges security professionals face will not let up, as new threats emerge on a weekly—<br />

even daily—basis. Security teams need to stay in<strong>for</strong>med if they want to effectively protect themselves<br />

and their organizations, so they’re constantly asking themselves a stream of questions: How are attackers<br />

behaving? Are certain attack types becoming more prevalent? What vulnerabilities are attackers<br />

exploiting, and how can organizations fight back?<br />

Today’s businesses can’t af<strong>for</strong>d to wait--they need in<strong>for</strong>mation they can act on right away. That’s why<br />

Expel recently released its first Quarterly Threat Report (QTR), highlighting cybersecurity trends from the<br />

first quarter of <strong>2022</strong> that provide insight into what organizations can expect as the year continues. It won’t<br />

come as a shock to learn that identity-based attacks loom large and should be considered public enemy<br />

number one.<br />

Attackers Continue to Exploit Poor Identity Security<br />

Identity-based attacks accounted <strong>for</strong> 65% of all incidents observed by Expel during Q1, with business<br />

email compromise (BEC) and business application compromise (BAC) accounting <strong>for</strong> 63% on their own.<br />

The remaining 2% were identity-based attacks within cloud environments like Amazon Web Services<br />

(AWS) and Google Cloud Plat<strong>for</strong>m (GCP). This keeps with the broader trend: attackers are leveraging<br />

stolen credentials and other vulnerabilities to exploit poor identity security and gain access to networks.<br />

The <strong>2022</strong> Verizon Data Breach Investigations Report underscores these findings, noting that stolen<br />

credentials led to nearly 50% of all attacks in 2021—an increase of nearly 30% in the past five years<br />

alone.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>July</strong> <strong>2022</strong> <strong>Edition</strong> 177<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!