- Network Edge units make up nearly 30% of intrusion points
- Ransomware is still the most popular attack type
- Units at the end of life pose a serious risk of security
Learning is not so much to learn that cyberattackers develop their tactics and that the number of attacks is growing every year. New research from Sophos shows that these incidents involving networking devices such as routers, VPNs and firewalls are becoming a growing point in intrusion – accounting for almost 30% of the first compromises observed in Sophos’ annual threat report.
In Ransomware and Data Exfiltration – VPNs, VPNs were the most popular initial compromise type – which made up 25% of events even higher than compromised credentials that are just over 15% – considering that billions of credentials have been stolen from companies around the world every year.
Not surprisingly, the Ransomware peaked the table for the number of incidents with over 90% of cases of event response to medium -sized organizations and 70% of the small business cases involving the attack.
Digital detritus
A noticeable trend in cyber security is the increase in social engineering attacks, primarily to collect credentials to advance to the targeted organization’s network. This is largely due to AI, which allows attackers to send more sophisticated phishing attacks at a higher rate than ever.
“Over the past several years, attackers have aggressively targeted edge units. Connection of the problem is the increasing number of devices (EOL) devices found in the nature-a problem call Digital Detritus. Because these devices are exposed to the Internet and often low on the list of patch priority, they are a very effective method for infiltrating networker,” sean gallages, pirther, pirther, pirther, pirther, pirther on SOP research, they are a very effective method of infiltrating networker, ”Sean Gallager, Pritichers, Priticherte Prewerste at So Shos.
Out-Date Tech poses a serious risk of cyber security teams and costs organizations in operating costs and security risks that make life cycle management an integral part of cyber defense.
“However, targeting of Edge units is part of a major shift, we witness where attackers do not need to insert customized malware. Instead, they can utilize companies’ own systems, increase their agility and hide in the places where security managers do not see,” adds Gallagher.