2024 Data Breach Investigations Report: Vulnerability exploitation boom threatens cybersecurity
The 2024 Data Breach Investigations Report by Verizon Business reveals a surge in vulnerability exploitation, with incidents doubling from 2022 to 2023. Ransomware and extortion techniques accounted for a third of breaches, while breaches involving human error remained high. The report highlights the increasing threat of zero-day vulnerabilities and the slow patching of critical vulnerabilities. It also emphasizes the importance of employee education in cybersecurity and the rise of third-party breaches. Overall, the findings stress the need for proactive cybersecurity measures and a shift in cybersecurity culture.
- None.
- None.
Insights
What you need to know:
- Vulnerability exploitation surged by nearly 3X (
180% ) last year. - Ransomware and the meteoric rise of extortion techniques accounted for a third (
32% ) of all breaches. - More than two-thirds (
68% ) of breaches involve a non-malicious human element. - 30,458 security incidents and 10,626 confirmed breaches were analyzed in 2023—a two-fold increase over 2022.
- Verizon security by the numbers: 4,200+ networks managed globally, 34 trillion raw logs processed/year, and 9 security operation centers around the globe.
BASKING RIDGE, N.J., May 01, 2024 (GLOBE NEWSWIRE) -- Verizon Business today released the findings of its 17th-annual Data Breach Investigations Report (DBIR), which analyzed a record-high 30,458 security incidents and 10,626 confirmed breaches in 2023—a two-fold increase over 2022.
The exploitation of vulnerabilities as an initial point of entry almost tripled from the previous year, accounting for
“The exploitation of zero-day vulnerabilities by ransomware actors remains a persistent threat to safeguarding enterprises,” said Chris Novak, Sr. Director of Cybersecurity Consulting, Verizon Business.
In a possible relief to some anxieties, the rise of artificial intelligence (AI) was less of a culprit vs challenges in large-scale vulnerability management. “While the adoption of artificial intelligence to gain access to valuable corporate assets is a concern on the horizon, a failure to patch basic vulnerabilities has threat actors not needing to advance their approach,” Novak said.
Analysis of the Cybersecurity Infrastructure and Security Agency (CISA) Known Exploited Vulnerabilities (KEV) catalog revealed that on average it takes organizations 55 days to remediate
“This year’s DBIR findings reflect the evolving landscape that today’s CISO’s must navigate-- balancing the need to address vulnerabilities quicker than ever before while investing in the continued employee education as it relates to ransomware and cybersecurity hygiene,” said Craig Robinson, Research Vice President, Security Services at IDC. “The breadth and depth of the incidents examined in this report provides a window into how breaches are occurring, and despite the low-level of complexity are still proving to be incredibly costly for enterprises.”
Last year,
The human element continues to be the front door for cybercriminals
Most breaches (
“The persistence of the human element in breaches shows that there is still plenty of room for improvement with regard to cybersecurity training, but the increase in self-reporting indicates a culture change that destigmatizes human error and may serve to shine a light on the importance of cybersecurity awareness among the general workforce,” Novak added.
Other key findings from this year’s report include:
32% of all breaches involved some type of extortion technique, including ransomware- Over the past two years, roughly a quarter (between
24% and25% ) of financially motivated incidents involved pretexting - Over the past 10 years, the Use of stolen credentials has appeared in almost one-third (
31% ) of all breaches - Half of the reaches in EMEA are internal
- Espionage attacks continue to dominate in APAC region
View the 2024 Data Breach Investigation Report (DBIR):
For more information on ways to help defend against zero-day vulnerabilities and other cyber threats, visit HERE.
Media contacts:
Carlos Arcila
+1.908-202-0479
Carlos.Arcila@verizon.com
Nilesh Pritam
+65 6248-6599
Nilesh.Pritam@sg.verizon.com
Sebrina Kepple
+44 7391 065817
Sebrina.Kepple@verizon.com
