Cybersecurity Digest #45: 7/03/2022 – 18/03/2022

Cybersecurity news

Cybersecurity Blog Posts

Research and analytics

  • Edgescan published a Vulnerability Statistics Report. As a result, time to Remediate (i.e. patch or reconfigure) a device/host layer critical risk is 61.4 days. The quickest remediation on a vulnerability that was found was 0.5 days.
  • Password attacks are on the rise because passwords themselves are very vulnerable to attack. This year’s Weak Password Report takes a look at both the human side and the tech side of why passwords are the weakest link in an organization’s network. As it turned out, 93% of the passwords used in brute force attacks include 8 or more characters.
  • DataGrail has published the results of its Data Privacy Trends: A CCPA Report, which examines consumer data privacy trends. In the report, the company compared the cost, volume and issues related to data privacy. As a result of the study, the number of Data Subject Requests (DSRs) nearly doubled year over year, the cost of processing Data Subject Requests more than doubled and on average, 26-50 employees are involved in the manual processing of DSRs.
  • The newly issued, in-depth Cylera Labs Kwampirs Shamoon Technical Report explains extensively, with artifacts, the different phases of the investigation, analysis and findings related to the evolution of Kwampirs and its connections with Shamoon 1 and 2 – where Kwampirs starts its activity between both Shamoon versions.
  • Immersive Labs conducted a study of human cyber capabilities. The report analyzes cyber knowledge, skills and judgments gained from more than half a million exercises and simulations conducted by more than 2,100 organizations over the past 18 months. They were broken down into parts to understand the cyber capabilities of the employees of the information security, application security and crisis response teams.
  • According to Technavio, the perimeter intrusion detection systems market share is expected to increase by USD 5.78 billion from 2021 to 2026, and the market’s growth momentum will accelerate at a CAGR of 9.2%.
  • F-Secure published a Financial Services Threat Landscape Report. The risk of legacy software and applications was a strong theme for financial services organizations F-Secure interviewed, which were unable to move away from this infrastructure due to key operational dependencies. The financial services sector is relatively heavily regulated for cybersecurity standards and assurance practice, but it still faces considerable challenges with asset identification, as well as vulnerability management of often large, complex sprawling environments.

Major Cyber Incidents