Gruppo ECP Advpress Automationtoday AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit Gruppo ECP Advpress Automationtoday AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit

Cyber security: the new face of cyber threats

The challenge of evolving cyber threats: how to protect companies from new attacks

The article highlights the importance of cybersecurity for businesses and the challenges they face. We discuss emerging trends in the cyber security landscape, such as identity-based attacks, and the agility and sophistication of cyber adversaries. We emphasize the need for collaboration between security teams and the use of effective partners and strategies to address increasingly rapid and complex threats.
This pill is also available in Italian language

Corporate IT security can no longer underestimate the growing number of cyber adversaries who, with increasingly sophisticated methods, seek to compromise systems and networks. According to CrowdStrike's Threat Hunting Report, the time it takes attackers to infiltrate a compromised system has decreased significantly. This evolution requires CISOs to adequately prepare for future threats.

Emerging trends in the cyber security landscape

The financial sector in Europe has become a favorite target for cyber attacks, even surpassing the telecommunications and technology sectors. In particular, Iranian-connected hacker groups have carried out intrusions into the telecommunications sector using tools such as Cobalt Strike, PsExec, ProcessHacker, Mimikatz and NetScan. At the same time, eCrime has increased in several sectors, including the financial sector.

Identity-based attacks: a growing threat

Recent trends indicate that cyber attackers are focusing their efforts on identity-based attacks. Over 60% of interactive intrusions were based on the abuse of valid accounts. Additionally, the number of Kerberoasting attacks, a technique that allows cybercriminals to obtain valid credentials for Microsoft Active Directory service accounts, is on the rise. These attacks pose a significant threat to businesses, as attackers do not need sophisticated tools to carry them out.

The challenge of an agile and sophisticated opponent

CrowdStrike's 2023 Threat Hunting Report highlighted that cyber adversaries have become more agile and sophisticated than in previous years, significantly reducing the time it takes to infiltrate systems. To address these threats, it is critical that cybersecurity teams collaborate closely with their partners and develop effective strategies to detect and neutralize breaches at an increasingly rapid pace. Furthermore, cooperation between humans and machines becomes increasingly necessary to cope with the complexity and speed of cyber threats.

Follow us on Twitter for more pills like this

09/15/2023 16:25

Marco Verro

Last pills

Cloudflare repels the most powerful DDoS attack ever recordedAdvanced defense and global collaboration to tackle new challenges of DDoS attacks

Silent threats: the zero-click flaw that compromises RDP serversHidden risks in remote work: how to protect RDP servers from invisible attacks

Discovery of vulnerability in Secure Boot threatens device securityFlaw in the Secure Boot system requires urgent updates to prevent invisible intrusions

North korean cyberattacks and laptop farming: threats to smart workingAdapting to new digital threats of remote work to protect vital data and infrastructures

Don’t miss the most important news
Enable notifications to stay always updated