Cybersecurity Digest #64: 28/11/2022 – 12/12/2022

Cybersecurity news

Cybersecurity Blog Posts

Research and analytics

  • MIT Technology Review Insights  released The Cyber Defense Index 2022/23. The Cyber Defense Index is a ranking of 20 of the world’s major economies according to their collective cybersecurity assets, organizational capabilities, and policy stances. Topping the list for the year is Australia, the Netherlands, and South Korea.
  • Google Cloud said that half of the 500 companies it surveyed in a report released last week have experienced at least one API security incident over the past 12 months. Furthermore, the same survey identifies misconfigurations as the main threat to API infrastructure.
  • According to NordPass’ latest list of top 200 most common passwords in 2022, “password” is the most popular choice, followed by “123456”, “123456789”, “guest” and “qwerty“. The entire list of top 200 most common passwords in 2022 can be viewed here, and the passwords have been also categorized by country to show more localized choices.
  • Elastic released the 2022 Elastic Global Threat Report, detailing the evolving nature of cybersecurity threats, as well as the increased sophistication of cloud and endpoint-related attacks. 33% of attacks in the cloud leverage credential access, indicating that users often overestimate the security of their cloud environments and consequently fail to configure and protect them adequately.
  • BlueFort Security has announced the results of its 2022 CISO survey, which revealed that while CISOs are still experiencing challenges around visibility, intelligence and control, 47% are proactively focused on digital transformation and cloud migration.
  • Check Point Research (CPR) has analyzed the files that are for sale on the Dark Web, whose sellers claim are from WhatsApp users, revealing the leak includes 360 million phone numbers from 108 countries.
  • With more and more data breaches affecting businesses around the globe, the Singapore Computer Emergency Response Team (SingCERT) has released a report documenting important findings from this trend. The report highlights the most common causes of data breaches, how to prevent them and includes a list of major data breaches from the past decade, including Sony Pictures in 2014, Yahoo in 2016 and this year’s Optus breach.
  • Georgia State University  research shows that, like most legal commodities, stolen data products flow through a supply chain consisting of producers, wholesalers and consumers. But this supply chain involves the interconnection of multiple criminal organizations operating in illicit underground marketplaces. Data from 30 dark web underground markets over a period of eight months suggests that cybercrime groups made roughly $140 million from the sale of stolen data.

Major Cyber Incidents