6d0cd77a2fe7cb21d570f24ee6c8c6ee.jpg

Comcast Business Cybersecurity Threat Report Analyzes 23.5…

[ad_1]

Comcast Business yesterday announced the release of its inaugural Comcast Business Cybersecurity Threat Report, presenting essential insights into the global cybersecurity landscape and effective strategies for technology and security leaders to safeguard their organizations against evolving cyber threats.

The report leverages data from 23.5 billion cybersecurity attacks, spanning 500 threat types and 900 distinct infrastructure and software vulnerabilities, that Comcast Business helped customers navigate in 2022 and sheds light on the new threat matrix and strategies adversaries employ to access enterprise networks. Key themes from this year’s report include:

  • The majority of breaches now originate with the users of internal and external resources – Cyber-attacks used to begin with an exploit of a vulnerability in public-facing network resources that connect to applications and infrastructure within the network perimeter. Research has shown that today, approximately 67% of all breaches start with someone clicking on a seemingly safe link, which explains why adversaries begin 80-95% of all attacks with a phish.
  • Adversaries’ use of reconnaissance tactics underscores the importance of only accepting network connection requests from trusted sources – Attackers do their homework to uncover vulnerabilities, like open ports and misconfigured systems, as evidenced by the 242 million reconnaissance scans of customer networks and assets. The top reconnaissance tools employed by adversaries include vulnerability scanners, botnets and phishing. Once inside a network, adversaries made 2.6 million attempts to modify or create new firewall rules to establish external communications for command-and-control operations and data exfiltration.
  • Remote desktop has become an increasingly targeted vulnerability – Adversaries used various methods, including remote desktop, theft and brute force attacks to steal credentials and gain unauthorized access to customer networks. Customer logs documented over 54 million attempts to exploit credentials for initial access. Additionally, bad actors capitalized on vulnerable Remote Desktop Protocol (RDP) configurations, resulting in over 185 million attempts to gain remote access. Unauthenticated users also exploited vulnerabilities in Transmission Control Protocol (TCP) and made 139 million attempts to establish connections to victim servers. Furthermore, credential-stealing malware contributed to 159 million attempts by adversaries to steal and use credentials to infiltrate compromised networks.
  • Adversaries continue to exploit the Apache Log4j vulnerability – The Apache Log4j vulnerability remains a significant threat due to the widespread deployment of millions of Java applications, leaving a staggering 72% of organizations vulnerable to exploits. Comcast Business prevented nearly 105 million Log4j exploit attempts in 2022. By regularly updating systems and optimizing operating performance, businesses can fortify their endpoints against potential cyber-attacks and mitigate the risks associated with Log4j exploits.
  • Distributed Denial-of-Service (DDoS) attacks will continue to be a concern as the world becomes more interconnected – Comcast Business detected 51,915 DDoS attacks in 2022. IT and technical service customers saw an increase in DDos attempts, making up 25% of attempts, joining education (46%), finance (14%) and healthcare (13%) as the most targeted industry segments. These attacks aimed to disrupt critical database servers and network resources, with over 210 million instances of denial-of-service attacks recorded.

IoT B2B
IoT B2B

Source: business.comcast.com/community/browse-all/details/2023-comcast-business-cybersecurity-threat-report

Noopur Davis, Executive Vice President, Chief Information Security and Product Privacy Officer, Comcast Corporation and Comcast Cable

Technology is accelerating at a breakneck pace – bringing sophisticated new tools to both attackers and defenders. And although attacker tools are evolving, social engineering continues to be the leading tactic used to breach corporate networks. CISOs and CIOs have to adjust to the evolving threat landscape to protect their organizations and customers.

Shena Seneca Tharnish, Vice President, Secure Networking and Cyber Security Solutions

No organization has perfect security, but everyone needs to understand their cybersecurity risks and build a plan to address the threats and trends the industry is experiencing. Technology teams today are best served through a comprehensive suite of powerful security solutions orchestrated to provide multiple layers of security.

[ad_2]
Source link

Comments are closed.