2024

Global Threat Intelligence Report

Growing attack surface and threat complexity mixed with reduced staffing and budgets is creating a perfect storm for security professionals

Key Insights from the 2024 Report

In 2023, we witnessed ransomware payments reach an all-time high of over $1 billion after a decline in 2022.
Malware continues to evolve to gain initial access, evade detection, and maintain persistence.

Top Attacked Sectors

Manufacturing, technology, and transport & distribution remained in the top 5 as we continue to see attacks against critical infrastructure and supply chains prioritized by adversaries and facing significant risk.

Ransomware Telemetry

United States and Manufacturing companies top the charts. Lockbit claimed the most victims for the second year in a row. We continue to see small and medium-sized businesses (SMBs) face significant risk, with over 50% of victims having less than 200 employees.

Malware Telemetry

Malware continues to evolve to gain initial access, evade detection, and maintain persistence. The modularization of malware, and the increase in adversaries living off the land, highlights the need for organizations to have more comprehensive protections in place.

Vulnerability Intelligence

Organizations should leverage these insights to assess vendors and limit what is allowed within their environments. Many of the most popular vendors by market share and reputation are also among the highest in announced Common Vulnerabilities and Exposures (CVE) each year.

Exploitation Insights

Last year, we highlighted the rapid integration of exploit code by malware and botnets for high-severity vulnerabilities, often aided by generative AI. We observed threat actors leveraging critical 0days for substantial gains in 2023, aligning with platforms targeted by vendors with the highest CVE volume.

Know the threats. Protect your business.

The cybersecurity landscape is rapidly evolving while security resources remain stagnant or decline, leaving organizations vulnerable to routine threats like exploitation, malware, and escalating ransomware and extortion incidents. Manufacturing suffers the most attacks, while Trojans persist as significant threats. Proactive security measures are urgently needed to counter these challenges.

How to Protect Cisco Meraki with XDR

How to Protect Cisco Meraki with XDR

In this post we will show you how you can easily add an additional layer of security by integrating Meraki with XDR. This will allow you to reap the benefits of both feature-rich network technology and best in class security operations without needing to employ highly specialized network and security teams.

How Threat Intelligence And XDR Enhance Small Business Cybersecurity

How Threat Intelligence And XDR Enhance Small Business Cybersecurity

In this post, we will explore the synergistic benefits of small businesses leveraging threat intelligence and Extended Detection and Response (XDR) solutions to help secure their IT environments and sensitive data resources.

Important Cybersecurity Questions For Every Small Business Owner to Ask

Important Cybersecurity Questions For Every Small Business Owner to Ask

This post explores some essential questions you need to ask about your business and cybersecurity posture. Answering them will help you protect your small business from a devastating cyberattack.

Have questions about the report?

We are here to help.

Contact Us

We value your privacy.

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic. By clicking "Accept", you consent to our use of cookies.