4

iTWire - Billions of credentials, personal records stolen through data breaches:...

 1 year ago
source link: https://itwire.com/business-it-news/security/billions-of-credentials,-personal-records-stolen-through-data-breaches-report.html
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
neoserver,ios ssh client

Friday, 10 March 2023 11:09

Billions of credentials, personal records stolen through data breaches: report Featured

By Gordon Peters

Last year, 4,518 data breaches were reported globally with threat actors exposing or stealing 22.62 billion credentials and personal records, ranging from account and financial information to emails and Social Security numbers, a new security report has revealed.

According to the new State of Cyber Threat Intelligence report from risk intelligence firm Flashpoint a growing body of evidence demonstrates just how extensively cyber threats are overlapping, intersecting, and relating—“from the resilient nature of the illicit communities where cybercriminals operate to the to the tactics, techniques, and procedures (TTPs) cyber threat actors use to execute their attacks”.

Flashpoint examines why these threats—from the online spaces in which cybercriminals operate to the tactics, techniques, and procedures (TTPs) they use to execute their attacks—are cyclical and what that means from an intelligence and security perspective.

“Consider the cycle of illicit communities, which is marked by the motions of takedowns (Raid Forums), resurrections (AlphaBay), and new venues (Libre) which may then be taken down,” according to the report’s intro.

“Call it a game of cat-and-mouse, of chicken-and-egg. To aim to understand where this cycle begins and ends, however, is to miss the point. Like other cycles in the threat landscape, the cycle of illicit markets should be viewed as a converged, self-serving mechanism whose continuity is fuelled by competition, evolving technology, communication preferences, law enforcement partnerships, know-how and other intangibles, and much more.

“And, like most modern organisations, threat actors employ multiple teams or individuals, with varying motivations and targets, as well as various tools to streamline the tasks that contribute to their main goal—the compromise of a victim’s systems.”

Acording to Flashpoint, organisations cannot afford to view, prepare for, mitigate, and prevent these threats in silos, “as though one threat (and the cycle it exists in) is separate from another”.

“Multiple disjointed feeds and solutions make identifying, prioritising, and mitigating persistent and evolving threats difficult and costly. Since threat vectors are converging, CISOs should aim to unify and rally their security and intelligence teams behind a single source of truth that integrates workflows between their Cyber Threat Intelligence (CTI), Fraud, Vulnerability Management (VM), and IT Security teams, as well as other functions,” Flashpoint says.

“It is through this lens that we examine the trends, data, analysis, strategies, and insights that will impact the ways in which security and intelligence teams tackle challenges in 2023,” Flashpoint concudes.

Read 2980 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here
BACK TO LATEST NEWS here


Lead-Machine_pink_600x260.jpg

ENABLE HYBRID CLOUD & REDUCE NETWORK LATENCY WHITEPAPER

Hybrid cloud promises to bring together the best of both worlds enabling businesses to combine the scalability and cost-effectiveness of the cloud with the performance and control that you can get from your on-premise infrastructure.

Reducing WAN latency is one of the biggest issues with hybrid cloud performance. Taking advantage of compression and data deduplication can reduce your network latency.

Research firm, Markets and Markets, predicted that the hybrid cloud market size is expected to grow from US$38.27 billion in 2017 to US$97.64 billion by 2023.

Colocation facilities provide many of the benefits of having your servers in the cloud while still maintaining physical control of your systems.

Cloud adjacency provided by colocation facilities can enable you to leverage their low latency high bandwidth connections to the cloud as well as providing a solid connection back to your on-premises corporate network.


Download this white paper to find out what you need to know about enabling the hybrid cloud in your organisation.

DOWNLOAD NOW!

PROMOTE YOUR WEBINAR ON ITWIRE

It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK