The Recycler
  • Ambiente 2025 Masthead
  • Katun web banner December 2022 NEW
  • G&G Masthead August 2024
  • Biuromax Masthead web banner March 2024

Cyber-attacks: Is it your fault?

September 30, 2019

Proofpoint’s annual Human Factor report shares details of top cybercriminal trends and reveals that more than 99 Percent of cyber-attacks need humans to click.

Proofpoint, Inc., a cybersecurity and compliance company, announced its annual Human Factor report findings, which highlight the ways in which cybercriminals target people, rather than systems and infrastructure, to install malware, initiate fraudulent transactions, steal data, and more.

The report, based on an 18-month analysis of data collected across Proofpoint’s global customer base, spotlights attack trends to help organisations and users stay safe.

“Cybercriminals are aggressively targeting people because sending fraudulent emails, stealing credentials, and uploading malicious attachments to cloud applications is easier and far more profitable than creating an expensive, time-consuming exploit that has a high probability of failure,” said Kevin Epstein, Vice President of Threat Operations for Proofpoint. “More than 99 percent of cyberattacks rely on human interaction to work—making individual users the last line of defence. To significantly reduce risk, organisations need a holistic people-centric cybersecurity approach that includes effective security awareness training and layered defences that provide visibility into their most attacked users.”

The report findings include:

  • More than 99 percent of threats observed required human interaction to execute – enabling a macro, opening a file, following a link, or opening a document – signifying the importance of social engineering to enable successful attacks.
  • Microsoft lures remain a staple. Nearly one in four phishing emails sent in 2018 were associated with Microsoft products. 2019 saw a shift towards cloud storage, DocuSign, and Microsoft cloud service phishing in terms of effectiveness. The top phishing lures were focused on credential theft, creating feedback loops that potentially inform future attacks, lateral movement, internal phishing, and more.
  • Threat actors are refining their tools and techniques in search of financial gain and information theft. While one-to-one attacks and one-to-many attacks were more common when impostor attacks first began to emerge, threat actors are finding success in attacks using more than five identities against more than five individuals in targeted organisations.
  • The top malware families over the past 18 months have consistently included banking Trojans, information stealers, RATs, and other non-destructive strains designed to remain resident on infected devices and continuously steal data that can potentially provide future utility to threat actors.

Categories : Around the Industry

Tags : Business Cybersecurity Security

  • Static Control June 2022 Big & Bold Ad
  • IR Italiana Web ad January 2021
  • TN Core Nov Web advert
  • Cartridge Web Nov Web Banner
  • GM Technology October 2024
  • Apex September 2024 Web ad
  • Ink Tank No Web advert
  • Biuromax web banner July 2024
  • G&G web advert October 2024
  • ITP Web ad January 2021
  • PCL Nov Web advert
  • Mito Web banner June 2024
  • CET Web ad December 2023
  • Denner Feb 2024 Web Ad
  • Zhono Web ad March 2024
  • denner UK Web Banner Jul 2024
  • HYB Web banner Jan 2024
  • Zhono Web ad March 2024
  • Denner Feb 2024 Web Ad
  • denner UK Web Banner Jul 2024
  • ITP Web ad January 2021
  • HYB Web banner Jan 2024
  • Mito Web banner June 2024
  • CET Web ad December 2023
  • PCL Nov Web advert
  • ITP Web ad January 2021
  • Mito Web banner June 2024
  • PCL Nov Web advert
  • CET Web ad December 2023
  • denner UK Web Banner Jul 2024
  • Denner Feb 2024 Web Ad
  • HYB Web banner Jan 2024
  • Zhono Web ad March 2024

The Recycler, Wittas House, Two Rivers, Station Lane, Witney, OX28 4BH, United Kingdom | Tel: +44 (0) 1993 899800 | Fax : +44 (0) 1993 226899
©2006-2023 The Recycler - Terms & Conditions - Privacy Policy including cookie use

Web design Dorset | Websites by Mark