• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • Contact Us

iHash

News and How to's

  • Wewatch V70 Pro 1080p 500 Lumen Projector for $169

    Wewatch V70 Pro 1080p 500 Lumen Projector for $169
  • The Rosetta Stone + Microsoft Office for Mac Lifetime Bundle for $199

    The Rosetta Stone + Microsoft Office for Mac Lifetime Bundle for $199
  • The 24-Hour Chatbot for $12

    The 24-Hour Chatbot for $12
  • The 2024 Complete Presentation & Public Speaking Bundle for $24

    The 2024 Complete Presentation & Public Speaking Bundle for $24
  • Apple iPhone XS Max (A1921) 64GB – Gold (Grade A+ Refurbished: Wi-Fi + Unlocked) for $349

    Apple iPhone XS Max (A1921) 64GB – Gold (Grade A+ Refurbished: Wi-Fi + Unlocked)  for $349
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

Exposing the Harsh Truths of Cyberattacks in New Report

Aug 31, 2023 by iHash Leave a Comment

Aug 31, 2023The Hacker News

Cyberattacks in New Report

How often do cyberattacks happen? How frequently do threat actors target businesses and governments around the world? The BlackBerry® Threat Research and Intelligence Team recently analyzed 90 days of real-world data to answer these questions. Full results are in the latest BlackBerry Global Threat Intelligence Report, but read on for a teaser of several interesting cyber attack statistics.

Analyzing Real-World Cyberattacks

In their most recent quarterly report, BlackBerry threat researchers analyzed the onslaught of malware-based attacks from December 2022 to February 2023. During that time, BlackBerry’s AI-powered endpoint protection solution, detected and blocked a total of 1,578,733 malware-based cyberattacks targeting customers.

90 Days of Cyberattacks

Based on analysis of cyberattacks detected and blocked during the 90-day window, the BlackBerry Threat Research and Intelligence Team recorded the following statistics:

  • Total number of malware-based attacks: 1,578,733
  • Number of unique attacks (using previously undetected malware): 200,454
  • Average number of cyberattacks per day: 17,280
  • Average number of cyberattacks per hour: 720
  • Average number of attacks per minute: 12
  • Average number of new malware variants per minute: 1.5

The latest report also analyzes changes in the velocity of cyberattacks detected during this period. The graph below shows a significant peak occurred in early December 2022, followed by a noticeable drop in the last week of the year, as many threat actors and their targets appeared to take a holiday break. Attacks ramped up again as cybercriminals got back to work in the new year.

The number of new malware variants detected was fairly consistent during the study period. Legacy signature-based antivirus products offer limited value against this steady onslaught of previously unseen attacks, leading many organizations to switch over to AI-based EPP (endpoint protection platform) solutions that have proven to be significantly more effective when evaluated by independent testing.

Most-Targeted Industries

The BlackBerry Threat Research and Intelligence Team also identified the most-attacked industries among those customers protected by BlackBerry products. The following data is based on the number of times BlackBerry’s zero trust access solution, CylanceEDGE™, stopped cyberattacks targeting organizations in various sectors.

The most-targeted industries during the study period included:

  1. Financial institutions
  2. Healthcare services and equipment, including hospitals, clinics, and medical devices
  3. Food and staples retailers, including supermarkets, drugstores, and companies that sell food products to other businesses

The report found these vertical industries accounted for 60% of the overall number of attacks. BlackBerry threat researchers also analyzed the types of malware deployed against these verticals.

The report reveals CylanceEDGE blocked 231,510 malware attacks against the financial services industry, with an average of 2,601 malware-based attacks attempted per day. Previously undetected malware variants appeared in 34 unique attacks each day. This data helped researchers ascertain that Metasploit®, an open-source pen-testing application, remains one of the most popular tools abused by threat actors targeting this industry.

Cyberattacks against the healthcare industry totaled 93,000 of the blocked attacks. These included 5,246 unique malware samples used against the healthcare vertical, averaging 59 previously undetected variants neutralized by BlackBerry technologies each day. The report notes an increase in use of the Emotet Trojan, the adversary simulation tool Cobalt Strike, and pervasive ransomware variants such as BlackCat being deployed against the healthcare industry during the reporting period.

Attacks against retail and retail supply chains comprised 12% of attempted intrusions stopped by BlackBerry endpoint security solutions. These industries provide essential services, and any failure in their ecosystems can lead to serious consequences that reverberate not only locally but also throughout the region, the country, or indeed the world. Increasing digital transformation and interconnectedness within and among industry verticals raise risks even higher.

What the Numbers Tell Us

Cybersecurity practitioners across numerous industries continue to struggle against a rising tide of fast-moving, sophisticated cyberthreats. BlackBerry’s CTO Shishir Singh asserts that the emergence of cybersecurity’s third generation will help, by ushering in more predictive defensive capabilities, fueled by further advances in artificial intelligence and machine learning. As these technologies mature, however, organizations are encouraged to increase their focus on prioritizing existing defenses based on contextualized cyber threat intelligence (CTI). The insights gleaned from expertly crafted, curated, and customized CTI can help organizations anticipate and withstand attacks, quickly recover from cyber incidents, and adapt to their evolving threat landscape.

For the latest information on new cyberattacks and the overall threat landscape, explore the BlackBerry Global Threat Intelligence Report.

Note: This article is expertly written and contributed by Bruce Sussman, Sr. Manager of Editorial at BlackBerry. He is a lifelong journalist who is passionate about cybersecurity because it is constantly in flux. He previously worked with CISOs and cybersecurity leaders at Gartner and SecureWorld.


Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: Security Tagged With: computer security, cyber attacks, cyber news, cyber security news, cyber security news today, cyber security updates, cyber updates, cyberattacks, data breach, Exposing, hacker news, hacking news, Harsh, how to hack, information security, network security, ransomware malware, report, software vulnerability, the hacker news, truths

Special Offers

  • Wewatch V70 Pro 1080p 500 Lumen Projector for $169

    Wewatch V70 Pro 1080p 500 Lumen Projector for $169
  • The Rosetta Stone + Microsoft Office for Mac Lifetime Bundle for $199

    The Rosetta Stone + Microsoft Office for Mac Lifetime Bundle for $199
  • The 24-Hour Chatbot for $12

    The 24-Hour Chatbot for $12
  • The 2024 Complete Presentation & Public Speaking Bundle for $24

    The 2024 Complete Presentation & Public Speaking Bundle for $24
  • Apple iPhone XS Max (A1921) 64GB – Gold (Grade A+ Refurbished: Wi-Fi + Unlocked) for $349

    Apple iPhone XS Max (A1921) 64GB – Gold (Grade A+ Refurbished: Wi-Fi + Unlocked)  for $349

Reader Interactions

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

macOS Sonoma is available today

Sep 26, 2023 By iHash

Essential Guide to Cybersecurity Compliance

Sep 26, 2023 By iHash

Tags

* Apple attacks Cisco computer security cyber attacks cyber crime cyber news cybersecurity Cyber Security cyber security news cyber security news today cyber security updates cyber threats cyber updates data data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS 7 iOS 8 iPhone Malware microsoft network security ransomware ransomware malware risk management security security breaches security vulnerabilities software vulnerability the hacker news Threat update video web applications

Latest

Wewatch V70 Pro 1080p 500 Lumen Projector for $169

Expires September 26, 2024 06:59 PST Buy now and get 32% off KEY FEATURES The Wewatch V70 Pro Projector is built with a 5.8-inch LCD display and TFT LCD display technology to project stunning visuals. Its light source brightness ranges from 17000 to 28000LM, with an ANSI brightness of 350LM to 500LM. The standard resolution […]

How to protect your child

How to protect your child’s privacy when using social networks and IMs

When I was growing up, I never gave much thought to the communications between my parents and my teachers. Typically, there was a back-to-school night; if ever I did something wrong, the communication was made in a phone call from the teacher or principal; and there were letters/results that needed to be signed by my […]

Heard on the Street – 9/26/2023

Welcome to insideBIGDATA’s “Heard on the Street” round-up column! In this regular feature, we highlight thought-leadership commentaries from members of the big data ecosystem. Each edition covers the trends of the day with compelling perspectives that can provide important insights to give you a competitive advantage in the marketplace. We invite submissions with a focus […]

Ukrainian Military Targeted in Phishing Campaign Leveraging Drone Manuals

Sep 25, 2023THNCyber Attack / Phishing Ukrainian military entities are the target of a phishing campaign that leverages drone manuals as lures to deliver a Go-based open-source post-exploitation toolkit called Merlin. “Since drones or Unmanned Aerial Vehicles (UAVs) have been an integral tool used by the Ukrainian military, malware-laced lure files themed as UAVs service […]

The 24-Hour Chatbot for $12

Expires September 26, 2123 07:59 PST Buy now and get 74% off KEY FEATURES The best way to implement AI in your business. Welcome to the 24-hout chatbot! This course teaches you to build a chatbot with Python. The best part? You can train your chatbot to use your own contextual data, so it responds […]

Why Investors have to Appreciate the Diversity of AI 

Since late last year, the global conversation about AI has been focused on large language models like OpenAI’s GPT-4 and Google’s Bard. LLMs have improved with remarkable speed, and ChatGPT is now the fastest-growing consumer application ever. It’s no wonder that LLMs have captured the public imagination, but AI has countless applications – including many that we […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2023
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT