Cybercriminals continue to act as sophisticated profit enterprises. Attackers are adapting and finding new ways to implement their techniques, increasing the complexity of how and where they host campaign operation infrastructure.

At the same time, cybercriminals are becoming more frugal. To lower their overhead and boost the appearance of legitimacy, attackers are compromising business networks and devices to host phishing campaigns, malware, or even use their computing power to mine cryptocurrency.

Scope and scale of the threat landscape

  • The volume of password attacks has risen to an estimated 921 attacks every second – a 74% increase in just one year.

Addressing vulnerabilities

  • 93% of ransomware incident response engagements revealed insufficient controls on privilege access and lateral movement.