• Ping Us
  • Our Team
  • About Us
Friday, May 23, 2025
Digitalys Mag
  • Home
  • Cybersecurity
  • Technology
  • Events
    • All
    • Conferences
    • Pop Culture
    National Cyber Security Congress 2.0

    National Cyber Security Congress 2.0

    Ryujin’Con 0: Videos + Article

    Ryujin’Con 0: Videos + Article

    Banzai 2018: Video + Review

    Banzai 2018: Video + Review

    Comic Con Tunisia 2018

    Comic Con Tunisia 2018

    Calendrier culturel de l’été 2018 – updated

    Calendrier culturel de l’été 2018 – updated

    [Securiday 2018] End User Protection

    [Securiday 2018] End User Protection

    • Conferences
    • Pop Culture
  • Entertainment
    • All
    • Gaming
    • Manga/Anime/comics
    • Movies / Series
    Koei Tecmo Victim of  DataBreach

    Koei Tecmo Victim of DataBreach

    Détective Conan : les épisodes de l’histoire principale triées [part 1]

    Détective Conan : les épisodes de l’histoire principale triées [part 3]

    Epic Games Store down due to Free Grand Theft Auto V offer

    Epic Games Store down due to Free Grand Theft Auto V offer

    Steam Security Saga: 0-Days, patches and researchers debates

    Steam Security Saga: 0-Days, patches and researchers debates

    [Warning] Une faille critique dans tous les jeux Blizzard permettra aux Hackers de détourner des millions de PC

    [Warning] Une faille critique dans tous les jeux Blizzard permettra aux Hackers de détourner des millions de PC

    Le clavier MantisTek GK2 pour gamers contient un KEYLOGGER!!!

    Le clavier MantisTek GK2 pour gamers contient un KEYLOGGER!!!

    • Manga/Anime/comics
    • Movies / Series
    • Gaming
  • LifeStyle
  • Funny
  • Vlogs
No Result
View All Result
Digitalys Mag
  • Home
  • Cybersecurity
  • Technology
  • Events
    • All
    • Conferences
    • Pop Culture
    National Cyber Security Congress 2.0

    National Cyber Security Congress 2.0

    Ryujin’Con 0: Videos + Article

    Ryujin’Con 0: Videos + Article

    Banzai 2018: Video + Review

    Banzai 2018: Video + Review

    Comic Con Tunisia 2018

    Comic Con Tunisia 2018

    Calendrier culturel de l’été 2018 – updated

    Calendrier culturel de l’été 2018 – updated

    [Securiday 2018] End User Protection

    [Securiday 2018] End User Protection

    • Conferences
    • Pop Culture
  • Entertainment
    • All
    • Gaming
    • Manga/Anime/comics
    • Movies / Series
    Koei Tecmo Victim of  DataBreach

    Koei Tecmo Victim of DataBreach

    Détective Conan : les épisodes de l’histoire principale triées [part 1]

    Détective Conan : les épisodes de l’histoire principale triées [part 3]

    Epic Games Store down due to Free Grand Theft Auto V offer

    Epic Games Store down due to Free Grand Theft Auto V offer

    Steam Security Saga: 0-Days, patches and researchers debates

    Steam Security Saga: 0-Days, patches and researchers debates

    [Warning] Une faille critique dans tous les jeux Blizzard permettra aux Hackers de détourner des millions de PC

    [Warning] Une faille critique dans tous les jeux Blizzard permettra aux Hackers de détourner des millions de PC

    Le clavier MantisTek GK2 pour gamers contient un KEYLOGGER!!!

    Le clavier MantisTek GK2 pour gamers contient un KEYLOGGER!!!

    • Manga/Anime/comics
    • Movies / Series
    • Gaming
  • LifeStyle
  • Funny
  • Vlogs
No Result
View All Result
Digitalys Mag
No Result
View All Result

Highlights from Verizon DBIR 2019

Alyssa Berriche by Alyssa Berriche
20 July 2019
3 min read
Highlights from Verizon DBIR 2019
99
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn

This year’s edition of Verizon Data Breach Investigations Report comes out with an of analysis 41,686 security incidents, of which 2,013 were confirmed data breaches with data provided by 73 sources. It has big focus on state-sponsored attacks and cyber-espionage. “Cyber-Espionage is rampant in the Public sector, with State-affiliated actors accounting for 79 % of all breaches involving external actors”.

First, let’s define Breach and Incident to avoid any potential misunderstanding.

Incident: A security event that compromises the integrity, confidentiality or availability of an information asset.

Breach: An incident that results in the confirmed disclosure—not just potential exposure—of data to an unauthorized party. So, basically, it includes only the incidents in which data was actually compromised.

What are some of the most interesting takeaways from Verizon’s latest annual security report?

  • Most of the malware arrived via email (90%) 
  • 21% breaches in cloud platform caused by misconfiguration.
  • If you are a C-suite Executive, you better pay attention to social engineering attacks.

The DBIR validated a lot of the things security professionals already knew. For example, the fact that the majority of attacks are carried out by outsiders.

  • 69% were external attacks.
  • 34% of attacks involved an internal actor. Which means that the person standing next to you at the coffee machine could be stealing company data or working with someone externally to steal company data.

“What are the bad guys doing?”

A quick glance at the figure below (Figure 12 from the report), phishing and the hacking action variety of use of stolen credentials are prominent fixtures.

  • 32% of breaches are victims of phishing 
  • 29% of the breaches involved stolen credentials

Which means that passwords remain the weak spot for enterprises.

Both two factor authentication and phishing awareness, training, and handling can go a long ways toward improving security in all organizations.

 

  • From the same figure, Only 6% of breaches in our data set this year involved exploiting vulnerabilities.

Broken myth

In the past, several security professionals assumed that only a fraction of companies needed to worry about state-sponsored attackers. After reading the report, it looks like even small businesses are now targets if they have information that someone wants.

  • 23% of bad actors are identified as nation-state or state affiliated compared to just 12% in the 2018 report.

While nation-state groups are often described as sophisticated actors with advanced skills and tools, the Verizon DBIR said:

  •  78% of cyberespionage-related incidents involved phishing.

“The purpose of this study is not to rub salt in the wounds of information security, but to contribute to the ‘light’ that raises awareness and provides the ability to learn from the past,” Verizon’s research team wrote in the report.

To read the full DBIR report click here.

 

Tags: BreachCyber Securitycyber-attaquesinfosecsecurity trendsSOCThreat IntelligenceVerizon
ShareTweetShareScan
Previous Post

Password Shaming Day! Oops, I mean World Password Day

Next Post

Critical RDS Vulnerability Allowing WannaCry-Like Attacks

Alyssa Berriche

Alyssa Berriche

Cyber Threat Analyst & Security researcher. Founder and Technical Writer for DigitaLys-Mag

Related Posts

Koei Tecmo Victim of  DataBreach
Cybersecurity

Koei Tecmo Victim of DataBreach

5 January 2021
Cybersecurity

[Vulnerability] Zerologon – CVE-2020-1472 exploited in the wild

8 October 2020
National Cyber Security Congress 2.0
Conferences

National Cyber Security Congress 2.0

26 January 2020
Next Post
Critical RDS Vulnerability Allowing WannaCry-Like Attacks

Critical RDS Vulnerability Allowing WannaCry-Like Attacks

Social Networks

  • 418 Fans
  • 141 Followers

Random Quote

Kindness is not a crime. But sometimes, it awakens the weakness and greed in others.

— Su-Won, Akatsuki no yona

Instagram

Follow-us on Instagram
Facebook Twitter Instagram Youtube
logo-digi

  • 407
  • 348
  • 3,123
  • 10,885
  • 112,365
  • 617,301
IMG 2486
IMG 20180707 104418
2016-05-29 15h04 19
IMG 2678
20160903 173716
20170415 111505
20170708 141158
20180707 112615
20160821 151426
20160821 125652
20180707 125631
20170708 173551

© 2019 Digitalys Mag - Personal Blog & Magazine.

No Result
View All Result
  • Home
  • Cybersecurity
  • Technology
  • Events
    • Conferences
    • Pop Culture
  • Entertainment
    • Manga/Anime/comics
    • Movies / Series
    • Gaming
  • LifeStyle
  • Funny
  • Vlogs

© 2019 Digitalys Mag - Personal Blog & Magazine.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In