Top 15 Threats: How The Crooks Are Coming At You
The latest Verizon Data Breach Report lists the top outside threats -- keyloggers, spyware, SQL injections, remote access and control -- and inside threats -- access and privilege abuse, usage and other policy violations -- that businesses have faced. The report is based on actual business's data breach experiences.
The latest Verizon Data Breach Report lists the top outside threats -- keyloggers, spyware, SQL injections, remote access and control -- and inside threats -- access and privilege abuse, usage and other policy violations -- that businesses have faced. The report is based on actual business's data breach experiences.According to Verizon, keyloggers and spyware were the top two attack types resulting in serious data breaches.
But there are plenty more attack vectors, as the new report shows.
The 2009 Data Breach Investigations Supplemental Report from Verizon is a detailed analysis and exploration of data company's earlier and even more detailed 2009 Data Breach Investigations Report.
Both are, I would say, must reads.
Drawing on information gathered by Verizon's computer forensics team, the top data breach attack result from:
1. Keyloggers/spyware
About the Author(s)
You May Also Like
Is AI Identifying Threats to Your Network?
May 14, 2024Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy
May 15, 2024Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks
May 16, 2024Why Effective Asset Management is Critical to Enterprise Cybersecurity
May 21, 2024Finding Your Way on the Path to Zero Trust
May 22, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024