Skip to content

At The Identity Organisation, we're here to help!

    Your privacy is important to us, and we want to communicate with you in a way which has your consent and which is in line with UK Law on data protection. As a result of a change in UK law on 25th May 2018, by providing us with your personal details you consent to us processing your data in line with current GDPR requirements.

    Here is where you can review our Privacy & GDPR Statement

    To remove consent at any time, please e-mail info@tidorg.com with the word "unsubscribe" as the subject.

    +44 (0) 1628 308038 info@tidorg.com

    Data Theft Extortion Attacks Rise 25 Percent in Just One Quarter and Take Top Attack Spot

    A recap of Q2 from Cisco Talos’ incident response services provides insight into exactly what kinds of attacks are being seen in the field, and what kinds of attacks you need to be protecting against.

    While I love covering industry reports here, I also love to see practical experiences from the field summarized into trends. And that’s exactly what we find with Cisco Talos Incident Response’s Incident Response trends Q2 2023 recap. In it, we get a summary of the kinds of incidents they responded to over the last quarter, and see how those attacks are trending.

    According to the recap:

    • Data Theft Extortion accounted for 30% of all threats they responded to, with ransomware in second place with 17%
    • Healthcare was the most-targeted vertical, accounting for 22% of all incidents
    • The most active extortion groups were Clop, Karakurt and RansomHouse

    Also worth noting is that Cisco Talos found that compromised credentials or valid accounts were the top observed means of gaining initial access, accounting for nearly 40 percent of all incidents. As a general rule, this points us back to a primary means of gaining access to credentials – through credential harvesting phishing attacks. These kinds of attacks are effectively the key to the success of the attacks Cisco Talos is seeing increases in. So, it becomes critical that organizations take steps – which includes enrolling users in security awareness training – to ensure users don’t fall for credential harvesting scams designed to provide initial access to these far more costly cyber attacks.


    Get Your Ransomware Hostage Rescue Manual

    This 26-page manual is packed with actionable info that you need to prevent infections, and what to do when you are hit with ransomware. You also get a Ransomware Attack Response Checklist and Prevention Checklist. You will learn more about:

    1. What is Ransomware?
    2. Am I Infected?
    3. I’m Infected, Now What?
    4. Protecting Yourself in the Future
    5. Resources

    Don’t be taken hostage by ransomware. Download your rescue manual now! 

    PS: Don’t like to click on redirected buttons? Cut & Paste this link in your browser: https://info.knowbe4.com/ransomware-hostage-rescue-manual-partner?partnerid=001a000001lWEoJAAW

    Sign Up to the TIO Intel Alerts!

    Back To Top