Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

5/10/2021
05:15 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

ESG Report Uncovers Security Decision Makers 2021 Cybercrime Concerns

NEW YORK--(BUSINESS WIRE)--HUMAN (formerly White Ops), a cybersecurity company that protects enterprises from bot attacks to keep digital experiences human, today published new research into security leaders’ perceptions of and responses to sophisticated bot attacks. The research, which was conducted by Enterprise Strategy Group (ESG), revealed concerns about the threats bots pose, including site slowdowns caused by overwhelming traffic, new account fraud, credential cracking/brute force attacks, account takeover, content manipulation, sensitive content scraping, and inventory exhaustion and cart abandonment.

The survey was conducted during the first quarter of 2021 and collected insights from 425 cybersecurity and IT decision makers with application security knowledge and responsibilities for their organizations.

“This research demonstrates how crucial a robust bot mitigation platform is to a strong cybersecurity posture,” said Tamer Hassan, Co-founder and CEO of HUMAN. “Sophisticated bots can have immense detrimental effects to customer experience, and the time it takes to rebuild trust with customers is time that today’s organizations don’t have.”

The 2021 Bot Management Trends report supports this fact. Several key findings from the report include:

  • Nearly half of respondents believe their organization would be susceptible to a sophisticated bot attack.
  • 90% of respondents view bot management as a top-five cybersecurity priority.
  • 37% of respondents confirmed that they’d been victimized by sophisticated bots in the past twelve months, while another 30% believe they had but couldn’t confirm.
  • It takes an average of nine months for victims of bot attacks to regain customer trust.
  • 86% of respondents believe most bots are capable of circumventing simple bot mitigation features.

“As organizations have shifted to more online-focused business operations, a trend further accelerated by the pandemic, attackers have doubled down on their efforts and increased the frequency of bot-driven fraud and logic abuse,” said John Grady, Senior Analyst at ESG. “This new research explores how application security leaders perceive the threat of bot attacks and what their plans are for combatting them.”

The report reveals additional valuable insights, including application security leaders’ perceptions of bot mitigation features within cybersecurity platforms, awareness of the capabilities of sophisticated bots, and organizational planning around bot mitigation investment in the next twelve months.

For more information on HUMAN, or the 2021 Bot Management Trends report, visit the report’s page on the HUMAN website. For more information on Application Integrity, HUMAN’s solution for bot mitigation for applications, visit https://www.humansecurity.com/products/application-integrity.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?
Tim Sadler, CEO and co-founder of Tessian,  6/17/2021
Edge-DRsplash-10-edge-articles
7 Powerful Cybersecurity Skills the Energy Sector Needs Most
Pam Baker, Contributing Writer,  6/22/2021
News
Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-2322
PUBLISHED: 2021-06-23
Vulnerability in OpenGrok (component: Web App). Versions that are affected are 1.6.7 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via HTTPS to compromise OpenGrok. Successful attacks of this vulnerability can result in takeover of OpenGrok. CVSS 3.1 ...
CVE-2021-20019
PUBLISHED: 2021-06-23
A vulnerability in SonicOS where the HTTP server response leaks partial memory by sending a crafted HTTP request, this can potentially lead to an internal sensitive data disclosure vulnerability.
CVE-2021-21809
PUBLISHED: 2021-06-23
A command execution vulnerability exists in the default legacy spellchecker plugin in Moodle 3.10. A specially crafted series of HTTP requests can lead to command execution. An attacker must have administrator privileges to exploit this vulnerabilities.
CVE-2021-34067
PUBLISHED: 2021-06-23
Heap based buffer overflow in tsMuxer 2.6.16 allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file.
CVE-2021-34068
PUBLISHED: 2021-06-23
Heap based buffer overflow in tsMuxer 2.6.16 allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file.