From prevention, detection and response to recovery, investigation and compliance, our unified end-to-end platform helps customers build cyber resilience via a holistic security portfolio. OpenText Cybersecurity provides comprehensive security solutions for companies and partners of all sizes. New to this year's report is the inclusion of data from Webroot Email Security Powered by Zix. Our threat research team analyzes and interprets the data using advanced machine learning and artificial intelligence. ![]() This data comes from over 95 million real-world endpoints and sensors, specialized third-party databases, and intelligence from end users protected by our leading technology partners like Cisco, Citrix, F5 Networks, and more. The threat intelligence, trends and details presented in the 2023 OpenText Cybersecurity Threat Report are based on data continuously and automatically captured by the BrightCloud® Threat Intelligence Platform, which is the proprietary machine learning-based architecture that powers all Webroot protection and BrightCloud® services. To view the complete 2023 OpenText Cybersecurity Threat report, visit 2023 Threat Report. Data confirms, cyber resilience using a layered defense strategy remains the best defense against today's cybercrime landscape.40.3% reduction in the number of devices that encountered malware for users who adopted all three layers of protection - Webroot SecureAnywhere, Webroot Security Awareness Training, and Webroot DNS Protection - versus devices using Webroot SecureAnywhere alone.The Netherlands and Germany made it into the top five, along with the US, China and Vietnam.The top 50,000 most-active malicious IP addresses originated from 164 countries.For businesses between 101-500 endpoints the rate rose to 58.7%.For businesses between 1-20 endpoints, the rate is 6.4%.28.5% of businesses with 21-100 protected endpoints encountered an infection in 2022.Law enforcement crackdowns on ransomware saw some success but have yet to make a large impact on the overall threat ransomware poses.Median ransomware payments meteor spike to almost $200k up from $70k last year.Double extortion from data exfiltration is commonplace in campaigns at a rate of 84%.55.5% year-over-year increase in HTTPS vs HTTP phishing attacks.Spear phishing email traffic increased 16.4% YoY and now accounts for approximately 8.3% of all email traffic.Over 1 billion unwanted emails classified as phishing.Email phishing is the primary vector for infection followed by remote desktop protocol (RDP) RDP was #1 last year.Analyzing high-risk URLs, on average, each malicious domain hosted 2.9 malware URLs, compared to only 1.9 phishing URLs.Manufacturing remains the #1 targeted industry vertical.Rising geopolitical tensions continue to influence malware campaigns.Malware on endpoint continues to decline 16.7% YoY.Key highlights from this year's report include: Acknowledging risks and preparing accordingly with a mulitlayered approach to protecting data are recommended courses of action for businesses of every size." A decline in malware infections indicates comprehensive security measures are effective," said Prentiss Donohue, Executive Vice President, OpenText Cybersecurity. "Cybercriminals are equal opportunity offenders. There is, however, some encouraging news. "Cyber bad actors, including nation-state players, continue to be persistent, innovative and effective. ![]() New malicious websites come online daily, while legitimate sites are occasionally compromised and co-opted for nefarious purposes. Meanwhile, online cybersecurity threats continue to emerge at an alarming pace. The percentage of malicious URLs hidden behind a proxy or geolocation-masking service increased 36% year-over-year (YoY). One notable trend from the past year was a significant increase in concealing the location of URLs hosting malware and phishing sites. Threat actors doubled down on longstanding tactics while demonstrating innovation with new techniques.
0 Comments
Leave a Reply. |