HomeCII/OTOrganizations Fail to Log 44% of Cyber Attacks, Major Exposure Gaps Remain

Organizations Fail to Log 44% of Cyber Attacks, Major Exposure Gaps Remain

Published on

spot_img

A recent report by Picus Security has revealed that 40% of tested environments are vulnerable to attack paths that could lead to domain admin access. This finding is particularly alarming as obtaining domain admin access essentially gives attackers full control over an organization’s IT infrastructure, akin to having a master key to unlock all doors.

The report, which analyzed over 136 million simulated cyber attacks, highlighted the prevalence of threat exposure gaps in enterprise networks. While organizations were able to prevent 7 out of 10 attacks on average, the remaining vulnerabilities could potentially allow attackers to move laterally through networks using automation. Alarmingly, only 56% of the attacks were logged by detection tools and a mere 12% triggered an alert, underscoring the inadequacy of current threat exposure management practices.

Dr. Suleyman Ozarslan, Picus co-founder and VP of Picus Labs, likened these cybersecurity gaps to a cascade of falling dominoes, emphasizing how small vulnerabilities can lead to major breaches. He pointed out that attackers leveraging domain admin privileges can wreak havoc on organizations, citing the example of a previous attack on MGM that caused significant disruptions to the company’s operations.

In response to these findings, security experts recommend adopting an “assume breach” mindset to bolster cybersecurity strategies. By placing equal emphasis on preventive controls, detection mechanisms, and incident response capabilities, organizations can better defend against potential threats and minimize the impact of breaches.

The report also shed light on endpoint security gaps, particularly in macOS environments. Mac endpoints were found to be less effective in preventing simulated attacks compared to Windows and Linux systems, suggesting a potential gap in IT and security team skill sets when it comes to securing macOS devices. Picus Security CTO Volkan Ertürk emphasized the importance of validating macOS systems and leveraging threat repositories to strengthen security measures in these environments.

To address these challenges, organizations are urged to take proactive measures such as continuous monitoring, regular evaluations of logging and alerting systems, and ongoing validation of endpoint security configurations. By prioritizing threat exposure management and adopting a holistic approach to cybersecurity, businesses can enhance their security posture and better protect against evolving cyber threats.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...