By now, most of the industry has realized we’re seeing a shift from the legacy perimeter-based security model to an identity-centric approach to cybersecurity. If defenders haven’t realized this, malicious actors certainly have, with 80% of web application attacks utilizing stolen credentials and 40% of breaches that don’t involve insider threats and user error involving stolen credentials, according to sources such as the 2022 Verizon Data Breach Investigation Report.
Compromised credentials were involved in incidents such as the 2021 Colonial national gas pipeline breach, the 2021 Oldsmar Florida water treatment plant attack, and an attack on the South Staffordshire water treatment plant in the UK in 2022, illustrating that these incidents can and have spilled over from the digital realm to the physical, impacting critical infrastructure.
More Stories
New Android Malware Uses .NET MAUI to Evade Detection
McAfee researchers have identified a new wave of Android malware campaigns leveraging .NET MAUI to steal sensitive user information through...
Cybercriminals Use Atlantis AIO to Target 140+ Platforms
Cybercriminals are increasingly leveraging Atlantis AIO, which automates credential stuffing attacks across more than 140 platforms Read More
The AI Fix #43: I, for one, welcome our new robot overlords!
In episode 43 of The AI Fix, our hosts discover a robot that isn't terrifying, a newspaper shuns journalists in...
NIST Warns of Significant Limitations in AI/ML Security Mitigations
NIST has urged more research and emphasis on developing mitigations for attacks on AI and ML systems Read More
China-Linked Weaver Ant Hackers Exposed After Four-Year Telco Infiltration
Sygnia has uncovered Weaver Ant, a Chinese threat actor that spied on telecommunications networks for years Read More
Dark Web Mentions of Malicious AI Tools Spike 200%
Kela researchers detect a 200%+ increase in dark web chatter about malicious AI tools Read More