Resurrected Ebury Botnet Enlists 400,000 Linux Servers

A notorious botnet known as Ebury has recently resurfaced, infecting over 400,000 Linux servers worldwide. This resurgence has raised concerns...

Surfshark, a leading VPN provider, has recently announced that its ID Alert service is now available in additional countries. This...

In recent years, there has been a growing concern over the use of malware by Chinese entities for surveillance in...

In recent years, there has been a growing concern over the use of malware by Chinese hackers to spy on...

In recent years, Chinese hackers have been increasingly targeting commercial shipping operations with the use of malware to conduct espionage....

In recent years, there has been growing concern over the Chinese government’s use of malware to surveil commercial shipping operations....

In recent years, Chinese hackers have been increasingly utilizing malware to conduct surveillance on commercial shipping operations. This alarming trend...

In today’s digital age, cybersecurity has become a critical concern for individuals, businesses, and governments alike. With the increasing amount...

The Nigerian government recently announced the suspension of a controversial cybersecurity tax following widespread public backlash. The tax, which was...

Ascension Health System, one of the largest non-profit health systems in the United States, recently fell victim to a ransomware...

A prominent Korean cybersecurity expert has recently been sentenced to prison for hacking into over 400,000 household cameras. The expert,...

Cloud providers in Singapore have been alerted to a recent cybersecurity update that could potentially impact their operations. The update,...

Cloud providers in Singapore have recently received an important cybersecurity update that aims to enhance the security of data stored...

Cloud providers in Singapore have been put on high alert as new cybersecurity regulations have been introduced by the government....

A zero-day vulnerability in Microsoft Windows’ Desktop Window Manager (DWM) has recently been discovered, raising concerns about the potential for...

A zero-day vulnerability in Microsoft Windows’ Desktop Window Manager (DWM) has recently been discovered, raising concerns about the potential for...

A zero-day vulnerability in Microsoft Windows’ Desktop Window Manager (DWM) has recently been discovered, raising concerns about the potential for...

As technology continues to advance, the need for portable and convenient accessories for mobile professionals has become increasingly important. ProtoArc,...

In today’s fast-paced world, mobile professionals are constantly on the go, working from various locations and devices. To meet the...

ESET, a leading cybersecurity company, recently released a report detailing the advanced persistent threat (APT) activity they observed from the...

ESET, a leading cybersecurity company, has recently released a report detailing their analysis of Advanced Persistent Threat (APT) activity from...

ESET, a leading cybersecurity company, recently released a report detailing the Advanced Persistent Threat (APT) activity observed from the fourth...

ESET, a leading cybersecurity company, has recently released a report detailing the Advanced Persistent Threat (APT) activity observed from the...

ESET, a leading cybersecurity company, has recently released a report detailing the Advanced Persistent Threat (APT) activity observed from Q4...

Apple has recently released an update to fix a critical vulnerability in iTunes for Windows. The vulnerability, which was discovered...

Apple has recently released a patch to fix a critical vulnerability in iTunes for Windows. The vulnerability, which was discovered...

Verizon’s Data Breach Investigations Report Reveals the Impact of Social Engineering on Breach Costs.

Verizon’s Data Breach Investigations Report (DBIR) is an annual report that provides insights into the latest trends and statistics related to data breaches. The 2021 report, which was released in May, revealed that social engineering attacks are becoming increasingly common and costly.

Social engineering is a type of cyber attack that involves manipulating people into divulging sensitive information or performing actions that compromise security. Examples of social engineering tactics include phishing emails, pretexting (creating a false scenario to gain access to information), and baiting (offering something of value in exchange for information).

According to the DBIR, social engineering attacks were involved in 36% of all data breaches in 2020. This represents a significant increase from the previous year, when social engineering was a factor in only 22% of breaches.

The report also found that social engineering attacks are more expensive than other types of breaches. The average cost per record for a social engineering breach was $711, compared to $146 for a non-social engineering breach. This is because social engineering attacks often involve the theft of large amounts of data, such as login credentials or financial information.

One reason why social engineering attacks are so effective is that they exploit human psychology. People are often the weakest link in an organization’s security, and attackers know this. They use tactics such as fear, urgency, and curiosity to trick people into giving up sensitive information or clicking on malicious links.

The DBIR recommends several strategies for mitigating the risk of social engineering attacks. These include:

– Educating employees about the risks of social engineering and how to recognize and avoid these types of attacks.

– Implementing multi-factor authentication to make it harder for attackers to gain access to sensitive systems.

– Monitoring network activity for signs of suspicious behavior, such as unusual login attempts or data exfiltration.

– Conducting regular security assessments to identify vulnerabilities and address them before they can be exploited.

In conclusion, the 2021 Verizon DBIR highlights the growing threat of social engineering attacks and their impact on breach costs. Organizations must take steps to educate their employees, implement strong security measures, and monitor their networks to protect against these types of attacks. By doing so, they can reduce the risk of a costly data breach and protect their sensitive information from falling into the wrong hands.