www.helpnetsecurity.com Open in urlscan Pro
35.85.86.23  Public Scan

URL: https://www.helpnetsecurity.com/2024/08/30/cyber-threat-intelligence-report-key-threats/
Submission: On September 02 via api from TR — Scanned from DE

Form analysis 1 forms found in the DOM

POST

<form id="mc4wp-form-1" class="mc4wp-form mc4wp-form-244483 mc4wp-ajax" method="post" data-id="244483" data-name="Footer newsletter form">
  <div class="mc4wp-form-fields">
    <div class="hns-newsletter">
      <div class="hns-newsletter__top">
        <div class="container">
          <div class="hns-newsletter__wrapper">
            <div class="hns-newsletter__title">
              <i>
                        <svg class="hic">
                            <use xlink:href="#hic-plus"></use>
                        </svg>
                    </i>
              <span>Cybersecurity news</span>
            </div>
          </div>
        </div>
      </div>
      <div class="hns-newsletter__bottom">
        <div class="container">
          <div class="hns-newsletter__wrapper">
            <div class="hns-newsletter__body">
              <div class="row">
                <div class="col">
                  <div class="form-check form-control-lg">
                    <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="520ac2f639" id="mcs1">
                    <label class="form-check-label text-nowrap" for="mcs1">Daily Newsletter</label>
                  </div>
                </div>
                <div class="col">
                  <div class="form-check form-control-lg">
                    <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="d2d471aafa" id="mcs2">
                    <label class="form-check-label text-nowrap" for="mcs2">Weekly Newsletter</label>
                  </div>
                </div>
              </div>
            </div>
            <div class="form-check form-control-lg mb-3">
              <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="28abe5d9ef" id="mcs3">
              <label class="form-check-label" for="mcs3">(IN)SECURE - monthly newsletter with top articles</label>
            </div>
            <div class="input-group mb-3">
              <input type="email" name="email" id="email" class="form-control border-dark" placeholder="Please enter your e-mail address" aria-label="Please enter your e-mail address" aria-describedby="hns-newsletter-submit-btn" required="">
              <button class="btn btn-dark rounded-0" type="submit" id="hns-newsletter-submit-btn">Subscribe</button>
            </div>
            <div class="form-check">
              <input class="form-check-input" type="checkbox" name="AGREE_TO_TERMS" value="1" id="mcs4" required="">
              <label class="form-check-label" for="mcs4">
                <span>I have read and agree to the <a href="https://www.helpnetsecurity.com/newsletter/" target="_blank" rel="noopener" class="d-inline-block">terms &amp; conditions</a>
                </span>
              </label>
            </div>
          </div>
        </div>
      </div>
    </div>
  </div><label style="display: none !important;">Leave this field empty if you're human: <input type="text" name="_mc4wp_honeypot" value="" tabindex="-1" autocomplete="off"></label><input type="hidden" name="_mc4wp_timestamp"
    value="1725243375"><input type="hidden" name="_mc4wp_form_id" value="244483"><input type="hidden" name="_mc4wp_form_element_id" value="mc4wp-form-1">
  <div class="mc4wp-response"></div>
</form>

Text Content

 * News
 * Features
 * Expert analysis
 * Videos
 * Events
 * Whitepapers
 * Industry news
 * Product showcase
 * Newsletters

 * 
 * 
 * 


Please turn on your JavaScript for this page to function normally.
Help Net Security
August 30, 2024
Share


CYBER THREATS THAT SHAPED THE FIRST HALF OF 2024



Global cybercrime has shown no sign of decline and is expected to grow strong
per year over the next five years. To identify the most urgent cybersecurity
threats of the first half of 2024, the Critical Start Cyber Research Unit (CRU)
analyzed 3,438 high and critical alerts generated by 20 supported EDR solutions,
as well as 4,602 reports detailing ransomware and database leak activities
across 24 industries in 126 countries.



The first half of 2024 saw a worrying trend in cyberattacks targeting specific
industries and key report findings include:

Manufacturing and Industrial Products remains the top targeted industry by cyber
threat actors in H1 2024, leading with 377 confirmed reports of ransomware and
database leak hits in the first half of the year.

Professional Services saw an increase in reported database leaks and ransomware
attacks, jumping by 15% compared to 2023 with 351 cases reported vs. 334. Legal
services organizations, including courthouses, and supply chains have become
prime targets due to the wealth of intellectual property and sensitive data they
possess.

Healthcare & Life Sciences – Ransomware and database leak incidents surged by
180% in February 2024 compared to the same period in 2023, coinciding with the
attack on Change Healthcare and other healthcare providers.

Engineering and Construction remained a consistent target for cyberattacks in
the first half of both 2023 and 2024 with the United States bearing the brunt of
cyberattacks in the first half of 2024, experiencing a staggering 46.15%
increase compared to 2023.

Technology – Researchers found a 12.75% decrease (from H1 2023) in database
leaks and ransomware attacks targeting technology companies.

“The first half of 2024 has painted a concerning picture of the ransomware
threat landscape. We are continuing to observe a surge in ransomware and
database leak activities,” said Callie Guenther, Senior Manager of Cyber Threat
Research at Critical Start. “With bad actors becoming more sophisticated, it is
vital for organizations to have a strong security culture and strategy in place.
MDR solutions that integrate asset inventory, endpoint controls security
coverage, and MITRE ATT&CK mitigations, help organizations proactively mitigate
risk, leading to a reduced attack surface and a more resilient security
infrastructure.”

The report also highlights trending concerns for businesses, including:

 * BEC attacks: Previously focused on large corporations, BEC scammers are now
   targeting smaller, less cybersecurity-conscious businesses.
 * Deepfakes and social engineering: Findings show a surge in deepfake attacks,
   with an exponential 3,000% increase in deepfake fraud attempts.
 * Abuse of open-source repositories: Attackers are increasingly using these
   repositories to launch two main types of attacks: repo confusion attacks and
   supply chain attacks.





More about
 * Critical Start
 * cybercrime
 * report
 * survey
 * threats

Share


FEATURED NEWS

 * How RansomHub went from zero to 210 victims in six months
 * Sinon: Open-source automatic generative burn-in for Windows deception hosts
 * Midnight Blizzard delivered iOS, Chrome exploits via compromised government
   websites

Download: CIS Critical Security Controls v8.1



SPONSORED

 * eBook: Cloud security skills
 * Download: The Ultimate Guide to the CISSP
 * eBook: Do you have what it takes to lead in cybersecurity?




DON'T MISS

 * How RansomHub went from zero to 210 victims in six months
 * Sinon: Open-source automatic generative burn-in for Windows deception hosts
 * Midnight Blizzard delivered iOS, Chrome exploits via compromised government
   websites
 * The NIS2 Directive: How far does it reach?
 * Pioneer Kitten: Iranian hackers partnering with ransomware affiliates




Cybersecurity news
Daily Newsletter
Weekly Newsletter
(IN)SECURE - monthly newsletter with top articles
Subscribe
I have read and agree to the terms & conditions
Leave this field empty if you're human:

© Copyright 1998-2024 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us
×