ETFOptimize | High-performance ETF-based Investment Strategies

Quantitative strategies, Wall Street-caliber research, and insightful market analysis since 1998.


ETFOptimize | HOME
Close Window

Deepwatch Releases 2023 Adversary Tactics and Intelligence (ATI) Annual Threat Report Finding a 59% Increase in CVEs Reported by CISA Since 2021

Deepwatch, the leader in advanced managed detection and response (MDR), today announced the release of its 2023 Annual Threat Report created by the Deepwatch Adversary Tactics and Intelligence (ATI) team. The report highlights a collection of data on the leading cybersecurity threats that security operation centers (SOC) analysts faced in 2022 and predicts what teams will likely face in 2023.

Top Threats for 2022 revealed

  • Ransomware operators conducted frequent attacks and demanded more ransom than ever, brazenly publicizing victims and stoking an ecosystem of access brokers, ransomware service providers, insurance providers, and ransom negotiators.
  • The war between Ukraine and Russia unleashed a flurry of amateur and state-sponsored attacks and breaches on organizations and critical infrastructure.
  • A record 26,448 software security flaws were reported by CISA, with the number of critical vulnerabilities (CVEs) up 59% from 2021, a total of 4,135.
  • Information stealing malware, active exploitation of internet-facing vulnerabilities, and infected open-source code present new threats requiring increased vigilance.

“In 2022, Security Operations teams were forced to contend with the dual sided challenge of a rapidly expanding attack surface and increasingly complex threats,” said Jerrod Barton, Senior Director of ATI at Deepwatch. “As we move forward in 2023, data extortion and attacks of opportunity will continue to evolve, employing different extortion tactics and techniques to force victims to pay the ransom. With threats evolving quickly, security organizations must operationalize threat intelligence by gathering data from every possible source, then effectively processing, correlating, and incorporating that information into day to day security operations to reduce risk.”

Cybercriminals Read OSINT Reports

Just as criminals in the physical world are known to insert themselves into criminal investigations, cybercriminals read publicly available Open Source Intelligence (OSINT) and analyst reports. Whether this is to learn what security researchers are reporting about them, a new technique, or discover the technical details of a new vulnerability, we expect this trend to continue in 2023.

A downside of this trend is that researchers may only publish some known details or refrain from making assessments for fear of being wrong and save the essential elements for private distribution, which reduces the overall value of the intelligence the cybersecurity community can gain from open-source reporting.

Information Stealing Malware on the Rise

As cybercriminals look for new ways to access sensitive information for financial gain, information stealing malware will continue to grow in popularity in 2023. As the amount of personal and financial data stored and transmitted online increases, cybercriminals will have more opportunities to steal this information. In addition, as more businesses and individuals work remotely and use devices to access sensitive internet-facing systems, the attack surface increases, giving cybercriminals more attack vectors.

As a result, we expect a continued increase in the development and use of information stealing malware for cybercriminals to steal sensitive information and sell it on cybercriminal marketplaces.

Source Code Repositories Will Continue to be Targeted

Source code repositories contain an organization’s proprietary and valuable intellectual property and may collect sensitive information such as credentials and access keys. Additionally, many organizations use these platforms to collaborate and share code, increasing the attack surface. As the remote work trend has accelerated, many companies rely more heavily on cloud-based platforms such as GitHub for their development and deployment needs. These factors make source code repositories an attractive target for cybercriminals, and organizations must be vigilant to protect themselves.

Vulnerability Exploitation Will Remain the Top Access Vector

With the increasing complexity of software systems and the growing number of devices connected to the internet, the attack surface for cybercriminals continues to expand. As more sensitive information is stored and processed online, the incentives for attackers to find and exploit vulnerabilities in software systems will continue to grow. Furthermore, many companies and organizations do not have sound vulnerability management programs to identify and fix vulnerabilities in their software systems, making them attractive targets for cybercriminals, highlighting the need for a vulnerability management service to identify and prioritize vulnerabilities to protect against these threats.

To learn more about the ATI 2023 Annual Report, please visit: https://www.deepwatch.com/2023-deepwatch-ati-threat-report/.

About Deepwatch

Deepwatch is the leader in managed detection and response, protecting organizations from ever-increasing cyber threats. Powered by Deepwatch’s cloud security platform, Deepwatch provides the industry’s fastest, most comprehensive detection and automated response to cyber threats and tailored guidance from dedicated experts 24/7/365 to reduce risk and improve security posture. The world’s leading companies, from the Fortune 100 to mid-sized enterprises, trust Deepwatch to protect their business. Visit www.deepwatch.com to learn more.

Contacts

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.


 

IntelligentValue Home
Close Window

DISCLAIMER

All content herein is issued solely for informational purposes and is not to be construed as an offer to sell or the solicitation of an offer to buy, nor should it be interpreted as a recommendation to buy, hold or sell (short or otherwise) any security.  All opinions, analyses, and information included herein are based on sources believed to be reliable, but no representation or warranty of any kind, expressed or implied, is made including but not limited to any representation or warranty concerning accuracy, completeness, correctness, timeliness or appropriateness. We undertake no obligation to update such opinions, analysis or information. You should independently verify all information contained on this website. Some information is based on analysis of past performance or hypothetical performance results, which have inherent limitations. We make no representation that any particular equity or strategy will or is likely to achieve profits or losses similar to those shown. Shareholders, employees, writers, contractors, and affiliates associated with ETFOptimize.com may have ownership positions in the securities that are mentioned. If you are not sure if ETFs, algorithmic investing, or a particular investment is right for you, you are urged to consult with a Registered Investment Advisor (RIA). Neither this website nor anyone associated with producing its content are Registered Investment Advisors, and no attempt is made herein to substitute for personalized, professional investment advice. Neither ETFOptimize.com, Global Alpha Investments, Inc., nor its employees, service providers, associates, or affiliates are responsible for any investment losses you may incur as a result of using the information provided herein. Remember that past investment returns may not be indicative of future returns.

Copyright © 1998-2017 ETFOptimize.com, a publication of Optimized Investments, Inc. All rights reserved.