{"id":10401,"date":"2023-04-10T05:25:01","date_gmt":"2023-04-10T05:25:01","guid":{"rendered":"https:\/\/www.99techpost.com\/?p=10401"},"modified":"2023-10-02T06:56:17","modified_gmt":"2023-10-02T06:56:17","slug":"cybersecurity-facts-that-are-interesting-2023","status":"publish","type":"post","link":"https:\/\/www.99techpost.com\/cybersecurity-facts-that-are-interesting-2023\/","title":{"rendered":"2023 Cybersecurity Facts That are Interesting &amp; Frightening"},"content":{"rendered":"\n<p>Cyber attacks are recognized as one of the biggest threats to the world economy by the World Economic Forum. With digital dependency rising around the world, cyber-attacks are becoming more prevalent and intense. Below are some eye-opening facts that outline the scale of <a href=\"https:\/\/www.99techpost.com\/reasons-you-need-security-in-the-cyber-world\/#more-9324\">cybersecurity<\/a> threats to individuals and organizations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Cybercrime is Costing Trillions of Dollars<\/h2>\n\n\n\n<p>According to the Official Cybercrime Report by Esentire, the cost of cybercrime is estimated to cross $8 trillion by the end of 2023 and is estimated to hit $10.5 trillion by 2025.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/www.99techpost.com\/wp-content\/uploads\/2023\/04\/Cybercrime-is-Costing-Trillions-of-Dollars.jpg\"><img decoding=\"async\" width=\"666\" height=\"362\" src=\"https:\/\/www.99techpost.com\/wp-content\/uploads\/2023\/04\/Cybercrime-is-Costing-Trillions-of-Dollars.jpg\" alt=\"\" class=\"wp-image-10403\" srcset=\"https:\/\/www.99techpost.com\/wp-content\/uploads\/2023\/04\/Cybercrime-is-Costing-Trillions-of-Dollars.jpg 666w, https:\/\/www.99techpost.com\/wp-content\/uploads\/2023\/04\/Cybercrime-is-Costing-Trillions-of-Dollars-300x163.jpg 300w\" sizes=\"(max-width: 666px) 100vw, 666px\" \/><\/a><\/figure><\/div>\n\n\n<p><a href=\"https:\/\/cdn.bfldr.com\/FT8DAW4G\/at\/pnbvp8vsk3rbmkmsz58x8j8\/OTCS_2023_Threat_Report_Digital_Letter_REP_AMER_EN_1.pdf\" target=\"_blank\" rel=\"nofollow\">Source<\/a><\/p>\n\n\n\n<p>Asia, Africa, South America, and the Middle East saw 474% more malware infections in 2022 than in Australia, New Zealand, Japan, North America, and Europe. However, the rate of malware infection has decreased in most regions compared to 2021.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Digital Infrastructures are Vulnerable to Cyber Attacks<\/h2>\n\n\n\n<p>Digital systems are more vulnerable than ever. Automated scans are not able to <a href=\"https:\/\/www.99techpost.com\/vulnerability-management-that-will-protect-your-business\/#more-9793\">detect all vulnerabilities<\/a> in a company\u2019s digital infrastructure. HackerOne 2022 Report found that ethical hackers were able to detect 65,000 vulnerabilities that were missed by automated scans.<\/p>\n\n\n\n<p>According to the State of Attack Surface Management 2022 Report, 67% of organizations have seen a rise in the number of attack surfaces owing to the increase in remote work culture. This has increased the significance of <a href=\"https:\/\/www.scrut.io\/post\/what-is-caasm\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">cyber asset attack surface management<\/a> in companies. The report also mentions that 69% of data infrastructure was compromised because of a poorly managed internet-facing asset. This shows just how important it is to protect your data with strong digital infrastructure. You can even use <a href=\"https:\/\/acronymsolutions.com\/solutions\/managed-it\/manage-it\/\" target=\"_blank\" rel=\"nofollow\">managed it services <\/a>to help protect your data, taking a huge weight off your shoulders.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Cyber Attacks are Affecting Global Supply Chains<\/h2>\n\n\n\n<p>According to Gartner, 45% of global organizations will be impacted by cyber attacks on supply chains. In 2020, open-source supply chain systems like Solarwinds and Apache Log4j were put under cyber attacks and experienced data breaches. This had a significant impact on various supply chains across the world.<\/p>\n\n\n\n<p>The average malware infection rate across all industries is 13.1%. Among all industries, the manufacturing industry faces the highest malware infection with a 55.6% above-average infection rate.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/www.99techpost.com\/wp-content\/uploads\/2023\/04\/Cyber-Attacks-are-Affecting-Global-Supply-Chains.jpg\"><img decoding=\"async\" width=\"605\" height=\"468\" src=\"https:\/\/www.99techpost.com\/wp-content\/uploads\/2023\/04\/Cyber-Attacks-are-Affecting-Global-Supply-Chains.jpg\" alt=\"\" class=\"wp-image-10404\" srcset=\"https:\/\/www.99techpost.com\/wp-content\/uploads\/2023\/04\/Cyber-Attacks-are-Affecting-Global-Supply-Chains.jpg 605w, https:\/\/www.99techpost.com\/wp-content\/uploads\/2023\/04\/Cyber-Attacks-are-Affecting-Global-Supply-Chains-300x232.jpg 300w\" sizes=\"(max-width: 605px) 100vw, 605px\" \/><\/a><\/figure><\/div>\n\n\n<p><a href=\"https:\/\/cdn.bfldr.com\/FT8DAW4G\/at\/pnbvp8vsk3rbmkmsz58x8j8\/OTCS_2023_Threat_Report_Digital_Letter_REP_AMER_EN_1.pdf\" target=\"_blank\" rel=\"nofollow\">Source<\/a><\/p>\n\n\n\n<p>Manufacturing companies face significant losses owing to downtime and halt in production. This has made them a major target for malware attacks. Furthermore, among 9 industries that face higher than average infection rates, 4 are crucial parts of the global supply chain.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Ransomware Attacks are a Major Threat<\/h2>\n\n\n\n<p>Before 2020, ransomware attacks primarily used encryption to lock out the owner from accessing their data or applications. In 2021 &amp; 2022, many ransomware attacks shared screenshots of sensitive data with the owner as a threat. Aside from data breaches, 84% of ransomware attacks in 2022 also threatened to leak sensitive data.<\/p>\n\n\n\n<p>The average ransomware payments have significantly risen since 2018. The Ransomware attacks have targeted organizations of all sizes. In 2021 &amp; 2022, several government ministries as well as major tech companies have fallen victim to ransomware. The demand for ransom payments has ranged between <a href=\"https:\/\/cdn.bfldr.com\/FT8DAW4G\/at\/pnbvp8vsk3rbmkmsz58x8j8\/OTCS_2023_Threat_Report_Digital_Letter_REP_AMER_EN_1.pdf\" target=\"_blank\" rel=\"nofollow\">$25,000 to $13 million in bitcoins<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Data Breaches take More than 200 Days to Rectify<\/h2>\n\n\n\n<p>According to the <a href=\"https:\/\/www.ibm.com\/downloads\/cas\/3R8N1DZJ\" target=\"_blank\" rel=\"nofollow\">Cost of Data Breach Report<\/a> by IBM, 83% of organizations have been victims of more than one data breach. Among these 60% of organizations passed on the losses to their customers by increasing the prices.<\/p>\n\n\n\n<p>In 2022, <a href=\"https:\/\/www.veeam.com\/whitepapers\/veeam-ransomware-trends-executive-brief-2022-emea_wpp.pdf\" target=\"_blank\" rel=\"nofollow\">88% of ransomware attacks<\/a> targeted backup repositories. Among these 75% of the attacks were successful. It took 227 days on average for organizations to identify and contain a data breach. This is 3.5% less than the average time in 2021.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/www.99techpost.com\/wp-content\/uploads\/2023\/04\/Data-Breaches.jpg\"><img decoding=\"async\" src=\"https:\/\/www.99techpost.com\/wp-content\/uploads\/2023\/04\/Data-Breaches.jpg\" alt=\"\" class=\"wp-image-10405\" width=\"614\" height=\"467\" srcset=\"https:\/\/www.99techpost.com\/wp-content\/uploads\/2023\/04\/Data-Breaches.jpg 587w, https:\/\/www.99techpost.com\/wp-content\/uploads\/2023\/04\/Data-Breaches-300x228.jpg 300w\" sizes=\"(max-width: 614px) 100vw, 614px\" \/><\/a><\/figure><\/div>\n\n\n<p><a href=\"https:\/\/www.ibm.com\/downloads\/cas\/3R8N1DZJ\" target=\"_blank\" rel=\"nofollow\">Source<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Malicious URLs are Difficult to Trace<\/h2>\n\n\n\n<p>Cyber attackers used malicious URLs for phishing, hosting malware, and anonymization. <a href=\"https:\/\/cdn.bfldr.com\/FT8DAW4G\/at\/pnbvp8vsk3rbmkmsz58x8j8\/OTCS_2023_Threat_Report_Digital_Letter_REP_AMER_EN_1.pdf\" target=\"_blank\" rel=\"nofollow\">90.9% of malicious URLs<\/a> were intended for one of these three purposes.<\/p>\n\n\n\n<p>In 2022, 70% of malicious URLs were hidden behind geo-location masking to avoid detection. This is a significant rise compared to 49% in 2021. It is getting more difficult to identify those responsible for malware and phishing attacks because of geo-location masking.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Even HTTPS is Not Safe<\/h2>\n\n\n\n<p>Cyber attackers are using the perceived security of HTTPS servers to trap their victims. In 2022, 49.3% of phishing attacks were executed through HTTPS servers. This is 55.5% higher than in 2021.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/www.99techpost.com\/wp-content\/uploads\/2023\/04\/Even-HTTPS-is-Not-Safe.jpg\"><img decoding=\"async\" width=\"680\" height=\"472\" src=\"https:\/\/www.99techpost.com\/wp-content\/uploads\/2023\/04\/Even-HTTPS-is-Not-Safe.jpg\" alt=\"\" class=\"wp-image-10406\" srcset=\"https:\/\/www.99techpost.com\/wp-content\/uploads\/2023\/04\/Even-HTTPS-is-Not-Safe.jpg 680w, https:\/\/www.99techpost.com\/wp-content\/uploads\/2023\/04\/Even-HTTPS-is-Not-Safe-300x208.jpg 300w\" sizes=\"(max-width: 680px) 100vw, 680px\" \/><\/a><\/figure><\/div>\n\n\n<p><a href=\"https:\/\/cdn.bfldr.com\/FT8DAW4G\/at\/pnbvp8vsk3rbmkmsz58x8j8\/OTCS_2023_Threat_Report_Digital_Letter_REP_AMER_EN_1.pdf\" target=\"_blank\" rel=\"nofollow\">Source<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Cyber Attacks are Seasonal<\/h2>\n\n\n\n<p>A seasonal pattern has been observed in phishing attacks. The phishing activity typically rises during seasonal financial events such as income tax filing deadline dates. Another major rise in phishing attacks can be observed during the holiday season. During this period, phishing attacks used shipping alert emails to lure the victims.<\/p>\n\n\n\n<p>Phishing attacks impersonate individuals and brands to trap victims. These attacks impersonate key management positions such as CEO and CFO to attack employees in an organization through emails. They are also using current events to pressure their victims into complying.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Cyber Attackers Impersonate Major Brands<\/h2>\n\n\n\n<p>Email-based phishing attacks also impersonate major brands such as Facebook, Google, Apple, Instagram, Microsoft, and more to target their victims. In 2022, 49.7% of brand name phishing attacks were conducted using just the top 5 brand names.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Cyber Attacks Have Emotional Implications<\/h2>\n\n\n\n<p>According to the <a href=\"https:\/\/www3.weforum.org\/docs\/WEF_The_Global_Risks_Report_2022.pdf\" target=\"_blank\" rel=\"nofollow\">2022 Global Risk Report<\/a> by World Economic Forum, 95% of cybersecurity issues can be traced back to human error. <a href=\"https:\/\/www.99techpost.com\/cyber-security-needs-for-your-business\/#more-717\">Cybersecurity<\/a> attacks also have serious psychological implications.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/www.99techpost.com\/wp-content\/uploads\/2023\/04\/Cyber-Attacks-Have-Emotional.jpg\"><img decoding=\"async\" src=\"https:\/\/www.99techpost.com\/wp-content\/uploads\/2023\/04\/Cyber-Attacks-Have-Emotional.jpg\" alt=\"\" class=\"wp-image-10407\" width=\"617\" height=\"398\" srcset=\"https:\/\/www.99techpost.com\/wp-content\/uploads\/2023\/04\/Cyber-Attacks-Have-Emotional.jpg 598w, https:\/\/www.99techpost.com\/wp-content\/uploads\/2023\/04\/Cyber-Attacks-Have-Emotional-300x194.jpg 300w\" sizes=\"(max-width: 617px) 100vw, 617px\" \/><\/a><\/figure><\/div>\n\n\n<p><a href=\"https:\/\/www3.weforum.org\/docs\/WEF_The_Global_Risks_Report_2022.pdf\" target=\"_blank\" rel=\"nofollow\">Source<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Conclusion<\/h2>\n\n\n\n<p>These cybersecurity facts show that cybercriminals pose a serious threat to the safety of digital infrastructure around the globe. It is necessary for individuals and organizations to be aware of different types of attacks. They also need to employ rigorous cybersecurity measures so that they do not fall victim to these attacks. At the same time, they also need protocols to counter cyberattacks to contain the damage.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber attacks are recognized as one of the biggest threats to the world economy by the World Economic Forum. With digital dependency rising around the world, cyber-attacks are becoming more &#8230; <\/p>\n<p class=\"read-more-container\"><a title=\"2023 Cybersecurity Facts That are Interesting &amp; Frightening\" class=\"read-more button\" href=\"https:\/\/www.99techpost.com\/cybersecurity-facts-that-are-interesting-2023\/#more-10401\">Read More<span class=\"screen-reader-text\">2023 Cybersecurity Facts That are Interesting &amp; Frightening<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":7129,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[445],"tags":[],"class_list":["post-10401","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","no-featured-image-padding","resize-featured-image"],"_links":{"self":[{"href":"https:\/\/www.99techpost.com\/wp-json\/wp\/v2\/posts\/10401","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.99techpost.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.99techpost.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.99techpost.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.99techpost.com\/wp-json\/wp\/v2\/comments?post=10401"}],"version-history":[{"count":3,"href":"https:\/\/www.99techpost.com\/wp-json\/wp\/v2\/posts\/10401\/revisions"}],"predecessor-version":[{"id":13161,"href":"https:\/\/www.99techpost.com\/wp-json\/wp\/v2\/posts\/10401\/revisions\/13161"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.99techpost.com\/wp-json\/wp\/v2\/media\/7129"}],"wp:attachment":[{"href":"https:\/\/www.99techpost.com\/wp-json\/wp\/v2\/media?parent=10401"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.99techpost.com\/wp-json\/wp\/v2\/categories?post=10401"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.99techpost.com\/wp-json\/wp\/v2\/tags?post=10401"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}