Cybersecurity Digest #76: 30/05/2023 – 13/06/2023

Cybersecurity news

Cybersecurity Blog Posts

Research and analytics

  • CISOs and ITDMs continue to be most occupied with business, IT and security program strategy, but they are spending less time on threat research, awareness and hunting compared to 2022, according to Nuspire Second Annual CISO Research Report on Challenges and Buying Trends: A Focus on Optimization. 58% percent of CISOs and ITDMs said their budgets had increased, and of those, 42% said they have plans to increase their budgets even more.
  • Jumio 2023 Online Identity Study reveals an understanding among consumers around how generative AI and deepfake technologies could accelerate identity fraud, and the subsequent need for digital identities for online verification and authentication.  67% of consumers are aware of generative AI technologies but they overestimate the ability to detect a deep face video.
  • A US GAO report found that the DHS is still using legacy gear to run some of its critical systems, exposing itself to hacks and other security risks.
  • Palo Alto Networks’ Unit 42 has published its yearly report on network threats report, and the company says that last year, attacks exploiting vulnerabilities increased by 55% compared to 2021. In addition, the company also noted a 27.5% rise in malware explicitly targeting the operational technology industry.
  • The 2023 edition of the Verizon Data Breach Investigations Report examined 16,312 incidents, of which 5,199 were confirmed data breaches. Here are some of the main conclusions: DDoS remained the top cybersecurity incident last year; 83% of breaches involved the actions of an external actor; stolen creds, phishing, and vulnerability exploitation were the top 3 breach sources last year; 24% of breaches last year originated from a ransomware attack.
  • Malware researcher Igal Litzky has published a series of articles consisting of two parts (Part1, Part2), which are devoted to the analysis of Kraken infostealer.
  • The OALABS article discusses the AsyncRAT sample, its analysis and the AMSI (Anti-Malware Scan Interface – Windows protection Technology) bypass method.

Major Cyber Incidents