Telecoms News
  • Home
  • Telecoms News
  • Mobile Phones
    • Phone System
    • IP Phone
    • LTE Phone
    • Panasonic
    • Huawei
    • iPad
    • iPhone
  • Mobile Broadband
    • Video over Mobile Broadband
  • Internet
    • 3G Router
    • 4G Router
    • LTE Router
  • Network
    • Mobile Data
    • LTE
    • LTE Network
    • 4G
    • 4G Network
    • 4G Modem
    • GSM Gateway
    • VoIP
Trending Now
TELTONIKA ANNOUNCE RUTOS 7.05
Zyxel Nebula FWA510 High Speed 5G Router
Teltonika RUT906
Vodafone and Three Announce Merger Plans to Create...
ZTE MC889 Outdoor 5G Router
MFLEX – DaaS 4G and 5G Router with...
Teltonika
Teltonika RUT200
Teltonika RUT901
Teltonika RUTX50 5G Router
Telecoms News
  • Home
  • Telecoms News
  • Mobile Phones
    • Phone System
    • IP Phone
    • LTE Phone
    • Panasonic
    • Huawei
    • iPad
    • iPhone
  • Mobile Broadband
    • Video over Mobile Broadband
  • Internet
    • 3G Router
    • 4G Router
    • LTE Router
  • Network
    • Mobile Data
    • LTE
    • LTE Network
    • 4G
    • 4G Network
    • 4G Modem
    • GSM Gateway
    • VoIP
Telecoms News

Attacks on web applications rise as data moves to the cloud, Verizon finds

by telecomsnews 21/05/2020
by telecomsnews 21/05/2020 0 comment

Web applications are increasingly under attack as valuable enterprise data moves to the cloud, according to Verizon’s annual Data Breach Investigations Report.

Web application attacks doubled from last year, to 43%. In terms of actual breaches, cloud assets were involved in about 24% of breaches, while on-premise assets were involved in 70% of breaches. Cloud breaches involved an email or web application server 73% of the time, Verizon’s analysis found, and 77% of cloud breaches also involved breached credentials.

“This is not so much an indictment of cloud security as it is an illustration of the trend of cybercriminals finding the quickest and easiest route to their victims,” the report concluded.

Most cyberattacks are for financial gain and committed by outsiders, the report said, and actual breaches are often the result of mistakes such as misconfiguration — not necessarily the scenarios which might first come to mind when you think of hacking.

“When many people think of how hacking attacks play out, they may well envision the attacker dropping a Trojan on a system and then utilizing it as a beachhead in the network from which to launch other attacks, or to expand the current one,” the DBIR says. “However, our data shows that this type of malware peaked at just under 50% of all breaches in 2016, and has since dropped to only a sixth of what it was at that time (6.5%).” Instead, threats such as social phishing and the use of ransomware and password dumpers are increasing, as are error-based vulnerabilities such as misdelivery and misconfiguration.

The DBIR says that “as time goes on, it appears that attackers become increasingly efficient and lean more towards attacks such as phishing and credential theft.”

Verizons’ analysts looked at records of 157,525 incidents, of which around 32,000 met its quality standards and 3,950 were confirmed data breaches. The data came from 81 organizations in 81 countries around the world.

Among the findings:

-86% of data breaches were for financial gain, up from 71% last year.

-67% of actual data breaches were due to credential theft, errors and social attacks.

Mobile continues to represent only a small portion of overall incidents, but there was an interesting mobile-related anomaly in the data this year: more than a thousand cases of loss showed up in the data set after data collection protocols were updated with some data contributors.

“They were basically your device being left behind. What most of the mobile problems were, it’s talking about securing the end-point,” said Suzanne Widup, one of the five co-authors of this year’s DBIR.

“We would make this incredible spike in incidents one of our key findings, but we are pretty sure ‘forgetting your work mobile phone in a hipster coffee shop’ is not a new technique invented in 2019,” the report authors wryly noted in the report.

Those mobile “error” cases related to loss made up about 97% of mobile security incidents. But that remaining 3% was “split almost evenly between espionage and financial motives, which is incredibly significant when our overall breakdown of motives is of 64% financial and only 5% espionage,” the report continues. “And while the financially motivated ones vary from theft to the use of the device as a vessel for pretexting, the espionage-related cases are exclusively malware-based compromises of mobile devices to further persistence and exfiltration of data by advanced state-affiliated actors.” In other words, most of the mobile-related security risk comes from lost or stolen mobile devices, but there’s a very small chance that mobile devices could be used as a vehicle for more targeted and determined incursions.

Most cyber attacks, Widup said, are very short: fewer than five steps involved to accomplish them. If companies can add more hoops that attackers have to jump through, that’s a solid strategy for reducing or preventing breaches.

“The long it takes them, the more chances you have of stopping them or detecting them,” she said. The other way to use the DBIR report data, she added, is that if malware is detected in a system, it is indicative of an earlier breach — malware doesn’t just occur on its own, someone put it there. On the other hand, if there is a social engineering attempt, that is usually indicative of the beginning of an attack and activity can be traced from there.

Read the Verizon DBIR for 2020 here. 

Related Posts

0 comment
0
FacebookTwitterPinterestEmail
telecomsnews

previous post
How to use a PlayStation 4 controller with Android smartphone
next post
ZTE MF920V 4G Low Cost Travel Hotspot, Unlocked to all Networks- Black

Related Posts

Teltonika RUT906

18/07/2023

Vodafone and Three Announce Merger Plans to Create...

14/06/2023

ZTE MC889 Outdoor 5G Router

05/06/2023

Teltonika RUTX50 5G Router

23/08/2022

Speedroute SD-WAN

10/03/2022

Teltonika TCR100 4G Router

29/12/2021

Leave a Comment Cancel Reply

Save my name, email, and website in this browser for the next time I comment.

Recent Posts

  • TELTONIKA ANNOUNCE RUTOS 7.05
  • Zyxel Nebula FWA510 High Speed 5G Router
  • Teltonika RUT906
  • Vodafone and Three Announce Merger Plans to Create UK’s Largest Mobile Operator
  • ZTE MC889 Outdoor 5G Router

Stay Connect

Facebook Twitter Instagram

Recent Posts

  • TELTONIKA ANNOUNCE RUTOS 7.05

    01/11/2023
  • Zyxel Nebula FWA510 High Speed 5G Router

    01/11/2023
  • Teltonika RUT906

    18/07/2023
  • Vodafone and Three Announce Merger Plans to Create...

    14/06/2023
  • ZTE MC889 Outdoor 5G Router

    05/06/2023
  • MFLEX – DaaS 4G and 5G Router with...

    12/05/2023

Facebook Feed

Facebook

Popular Posts

  • 1

    WWDC 2020 News Hub Live Blog: iOS 14, watchOS 7, more

    22/06/2020
  • 2

    GUEST COLUMN: The nation’s broadband isn’t broken | Opinion

    23/05/2020
  • 3

    Stay up to date on WordPress with this $30 training

    06/07/2020
  • Panasonic KX-TDA Phone System Update – End Of Life Announcement

    19/05/2010
  • 5

    FIDECO WiFi Adapter – AC1200 Dual Band (5.8G/Max 867Mbps & 2.4G/Max 300Mbps), WiFi Dongle with 5dBi High Gain Antenna, USB 3.0 WiFi Adapter for Desktop/Laptop, Support Windows, Mac OS X and Linux

    09/06/2020

Categories

  • 3G Router (55)
  • 4G (6)
  • 4G (34)
  • 4G Modem (21)
  • 4G Network (33)
  • 4G Router (45)
  • 5G (9)
  • 5G Internet (8)
  • 5G Router (13)
  • Avaya Phone System (1)
  • Call Recording (1)
  • Clarity (2)
  • Cordless Phone (5)
  • dect phone (7)
  • Fixed IP SIM Card (5)
  • Gigaset (2)
  • GSM Gateway (15)
  • Hosted Telephony (11)
  • Huawei (2)
  • Internet (40)
  • IP Phone (27)
  • IP Phones (15)
  • iPad (9)
  • iPhone (2,002)
  • LTE (50)
  • LTE Network (34)
  • LTE Phone (25)
  • LTE Router (40)
  • M2M 5G Router (4)
  • Mobile Broadband (9)
  • Mobile Broadband (1,745)
  • Mobile Data (70)
  • Mobile Phones (1,870)
  • Panasonic (14)
  • Phone System (49)
  • Robustel (1)
  • SD WAN (1)
    • SD WAN PRO (1)
      • 4G Backup (1)
      • 4G Failover (1)
      • 5G Backup (1)
      • 5G Failover (1)
      • Bonded 4G (1)
      • Bonded 5G (1)
      • Bonding 4G Router (1)
      • Bonding 5G Router (1)
      • SDWAN PRO (1)
  • SIP Trunk (11)
  • Telecoms News (849)
    • Network Switch (2)
  • Teltonika (12)
  • Uncategorized (689)
  • Video over Mobile Broadband (5)
  • VoIP (6)
  • Zyxel (2)

Latest Post

  • TELTONIKA ANNOUNCE RUTOS 7.05

    01/11/2023
  • Zyxel Nebula FWA510 High Speed 5G Router

    01/11/2023
  • Teltonika RUT906

    18/07/2023

iPhone

  • Apple relaunches Apple Music beta website with new Listen Now tab

    12/08/2020
  • Apple ordered to pay PanOptis $506.2M for infringing LTE patents

    11/08/2020
  • Apple must pay $506 million to Optis Wireless for LTE patent infringement, jury decides

    11/08/2020

Popular Posts

  • 1

    WWDC 2020 News Hub Live Blog: iOS 14, watchOS 7, more

    22/06/2020
  • 2

    GUEST COLUMN: The nation’s broadband isn’t broken | Opinion

    23/05/2020
  • 3

    Stay up to date on WordPress with this $30 training

    06/07/2020
  • Facebook
  • Twitter
  • Instagram
  • Youtube
  • Vimeo

@2020 - All Right Reserved. www.telecomsnews.co.uk

Telecoms News
  • Home
  • About
  • Contact
  • Features
    • Typography
    • Gallery
  • Privacy Policy

Recent Posts

  • TELTONIKA ANNOUNCE RUTOS 7.05

    01/11/2023
  • Zyxel Nebula FWA510 High Speed 5G Router

    01/11/2023
  • Teltonika RUT906

    18/07/2023
  • Vodafone and Three Announce Merger Plans to Create...

    14/06/2023
  • ZTE MC889 Outdoor 5G Router

    05/06/2023
@2020 - All Right Reserved. www.telecomsnews.co.uk