www.infosecurity-magazine.com
Open in
urlscan Pro
3.167.152.32
Public Scan
URL:
https://www.infosecurity-magazine.com/news/orgs-victim-predictable-attacks/
Submission: On November 07 via api from TR — Scanned from CA
Submission: On November 07 via api from TR — Scanned from CA
Form analysis
2 forms found in the DOMGET https://www.infosecurity-magazine.com/search/
<form method="get" action="https://www.infosecurity-magazine.com/search/" role="search">
<input type="search" name="q" class="form-control" placeholder="Search site…" aria-label="Search keywords" required="required">
<button type="submit" class="form-button with-icon">
<svg viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg" role="img" aria-label="Search">
<path d="M15 15L21 21M10 17C6.13401 17 3 13.866 3 10C3 6.13401 6.13401 3 10 3C13.866 3 17 6.13401 17 10C17 13.866 13.866 17 10 17Z" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"></path>
</svg>
</button>
</form>
GET https://www.infosecurity-magazine.com/search/
<form method="get" action="https://www.infosecurity-magazine.com/search/" role="search">
<input type="search" name="q" class="form-control" placeholder="Search Infosecurity Magazine…" aria-label="Search keywords" required="required">
<input type="submit" value="Search" class="form-button">
</form>
Text Content
* Log In * Sign Up * * News * Magazine Features * Opinions * News Features * Interviews * Editorial * Blogs * Reviews * Slackspace * Next-Gen Infosec * Webinars * White Papers * Podcasts * Industry Events & Training * Magazine Events * Online Summits * Company Directory * Application Security * Automation * Big Data * Business Continuity * Cloud Security * Compliance * Cybercrime * Data Protection * Digital Forensics * Encryption * Human Factor * Identity Access Management * Industry Announcements * Internet Security * Malware * Managed Services * Mobile Security * Network Security * Payment Security * Physical and Information Security Convergence * Privacy * Risk Management * The Internet of Things * Log In * Sign Up * * News * Topics * Features * Webinars * White Papers * Podcasts * EventsEvents & Conferences * Directory * * Infosecurity Magazine Home » News » IRISSCON: Organizations Still Falling Victim to Predictable Cyber-Attacks IRISSCON: ORGANIZATIONS STILL FALLING VICTIM TO PREDICTABLE CYBER-ATTACKS News 6 Nov 2024 WRITTEN BY JAMES COKER Deputy Editor, Infosecurity Magazine * Follow @ReporterCoker * * * Despite most cyber threats, like ransomware, being both known and predictable, many orgnaizations are still underprepared. Experts speaking at the IRISSCON 2024 conference in Dublin noted that many incidents are indeed preventable. Analyzing the findings from Verizon’s Data Breach Investigations Report (DBIR) 2024, Phillip Larbey, Associate Director for EMEA at Verizon, said that the vast majority of cyber incidents involve at least one of three elements – human error, social engineering and ransomware. “Organizations should know what’s coming,” stated Larbey. Ransomware and extortion made up 32% of attacks in the DBIR. Attackers frequently use a combination of vulnerability exploitation and stolen credentials to gain initial access and then achieve lateral movement to enter the most sensitive systems and data without detection. Both tactics are normally preventable. Larbey highlighted DBIR figures which showed that 47% of vulnerabilities are still unremediated 60 days after discovery, while 8% are unremediated after 365 days. Therefore, organizations must become more agile and proactive with their vulnerability management strategies. Regarding credential theft, Larbey noted that unnecessarily high privilege levels are prevalent in organizations, which means compromised accounts makes moving around networks far easier for attackers. “User account privileges are way beyond what users want or are even aware of,” he said. In addition to addressing excessive privileges, it is straightforward for organizations to learn if any of their user credentials have been compromised. Larbey urged firms to use services that can provide weekly reports on whether any of their credentials have been published on the dark web. “Getting ready is the most critical part that isn’t happening,” he commented. PREPARING FOR BLACK SWAN EVENTS Separately, Dave Lewis, Global Advisory CISO at 1Password, and Rich Mogull, SVP Cloud Security at FireMon, explained that ‘Black Swan’ cyber events – those viewed as unforeseen – can and should in fact be planned for. This includes widespread cyber incidents like the 2017 NotPeyta malware attack. “You can’t predict when they’ll happen or what they’ll look like, but know they’ll happen,” said Mogull. He advocated for incident response processes used by emergency services to ensure an effective response to unexpected cyber incidents. This involves a triage system, which recognizes what needs to be addressed as a priority to enable fast recovery. Simple triage and rapid remediation model. Source: Dave Lewis, Global Advisory CISO at 1Password, and Rich Mogull, SVP Cloud Security at FireMon “It’s about having a system and process to account for the unknown,” said Mogull. There are incident response frameworks designed for real-world emergencies that are relevant to cybersecurity. This includes the US National Incident Management System (NIMS), which has clear steps and procedures in areas like communication and command and control infrastructure. YOU MAY ALSO LIKE 1. #IRISSCON: 12 WAYS TO DEFEND AND RESPOND TO CYBER-ATTACKS EFFECTIVELY News19 Nov 2021 2. CORPORATE CYBER-ATTACKS SPIKE 50% IN 2021 News11 Jan 2022 3. THE CYBER WAR ON OUR CRITICAL INFRASTRUCTURE AND HOW TO WIN Opinion25 Aug 2021 4. CRITICAL NATIONAL INFRASTRUCTURE: THE GROWING THREAT Magazine Feature7 Jul 2021 5. #IRISSCON: RANSOMWARE SHIFTS TO USE AFFILIATE DISTRIBUTORS, AND INFECT VIA RDP News21 Nov 2019 WHAT’S HOT ON INFOSECURITY MAGAZINE? * Read * Shared * Watched * Editor's Choice FIN7 GANG HIDES MALWARE IN AI “DEEPNUDE” SITES News3 Oct 2024 1 US SAYS RUSSIA BEHIND FAKE HAITIAN VOTERS VIDEO News4 Nov 2024 2 PAKISTANI HACKERS TARGETED HIGH-PROFILE INDIAN ENTITIES USING CUSTOM RAT News5 Nov 2024 3 NIGERIAN HANDED 26-YEAR SENTENCE FOR REAL ESTATE PHISHING SCAM News4 Nov 2024 4 US AND ISRAEL WARN OF IRANIAN THREAT ACTOR’S NEW TRADECRAFT News1 Nov 2024 5 HOW TO BACKUP AND RESTORE DATABASE IN SQL SERVER Blog27 Mar 2023 6 CISA LAUNCHES FIRST INTERNATIONAL CYBERSECURITY PLAN News30 Oct 2024 1 NORTH KOREAN HACKERS COLLABORATE WITH PLAY RANSOMWARE News31 Oct 2024 2 GOOGLE RESEARCHERS CLAIM FIRST VULNERABILITY FOUND USING AI News4 Nov 2024 3 SUSPICIOUS SOCIAL MEDIA ACCOUNTS DEPLOYED AHEAD OF COP29 News29 Oct 2024 4 CHENLUN’S EVOLVING PHISHING TACTICS TARGET TRUSTED BRANDS News29 Oct 2024 5 CISA WARNS OF CRITICAL SOFTWARE VULNERABILITIES IN INDUSTRIAL DEVICES News1 Nov 2024 6 THE FUTURE OF FRAUD: DEFENDING AGAINST ADVANCED ACCOUNT ATTACKS Webinar18 Jul 2024 1 HOW TO PROACTIVELY REMEDIATE RISING WEB APPLICATION THREATS Webinar30 May 2024 2 HOW TO MANAGE YOUR RISKS AND PROTECT YOUR FINANCIAL DATA Webinar30 Oct 2024 3 NEW CYBER REGULATIONS: WHAT IT MEANS FOR UK AND EU BUSINESSES Webinar10 Oct 2024 4 HOW TO UNLOCK FRICTIONLESS SECURITY WITH DEVICE IDENTITY & MFA Webinar11 Apr 2024 5 HOW TO OPTIMIZE THIRD-PARTY RISK MANAGEMENT PROGRAMS THROUGH NIST CSF 2.0 Webinar16 May 2024 6 #CYBERMONTH: SOFTWARE UPDATES, A DOUBLE-EDGED SWORD FOR CYBERSECURITY PROFESSIONALS News Feature10 Oct 2024 1 RUSSIA'S SVR TARGETS ZIMBRA, TEAMCITY SERVERS FOR CYBER ESPIONAGE News11 Oct 2024 2 #CYBERMONTH: HOW TO OUTSMART NOVEL PHISHING TACTICS AND TECHNIQUES News Feature1 Oct 2024 3 IVANTI: THREE CSA ZERO-DAYS ARE BEING EXPLOITED IN ATTACKS News9 Oct 2024 4 #CYBERMONTH: HOW TO PROTECT YOUR DIGITAL LIFE, SIX WAYS TO STAY SAFE ONLINE News Feature8 Oct 2024 5 31 NEW RANSOMWARE GROUPS JOIN THE ECOSYSTEM IN 12 MONTHS News8 Oct 2024 6 THE MAGAZINE * About Infosecurity * Meet the team * Contact us ADVERTISERS * Media pack CONTRIBUTORS * Forward features * Op-ed * Next-gen submission * * * * Copyright © 2024 Reed Exhibitions Ltd. * Terms and Conditions * Privacy Policy * Intellectual property statement * Cookies Settings * Cookie Policy * Sitemap We use cookies to analyse and improve our service, to improve and personalise content, advertising and your digital experience. We also share information about your use of our site with our social media, advertising and analytics partners. Cookie Policy Accept All Cookies Cookies Settings COOKIE PREFERENCE CENTRE We process your information, to deliver content or advertisements and measure the delivery of such content or advertisements, extract insights, and generate reports to understand service usage; and/or accessing or storing information on devices for that purpose. You can choose not to allow some types of cookies. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more, to change our default settings, and/or view the list of Google Ad-Tech Vendors. Cookie Policy MANAGE CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active Strictly Necessary Cookies These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Cookies Details PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. Cookies Details FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Cookies Details TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. If you do not allow these cookies, you will experience less targeted advertising. Cookies Details Confirm My Choices Back Button Back PERFORMANCE COOKIES Vendor Search Search Icon Filter Icon Clear Filters Information storage and access Apply Consent Leg.Interest All Consent Allowed Select All Vendors Select All Vendors All Consent Allowed Confirm My Choices