Advanced Phishing Attacks Tripled In 2022

Hackers are now using  in Artificial Intelligence and Machine Learning tools to simplify and automate the process of generating attacks. At the same time, according to research, the adoption of cloud collaboration apps and services has greatly expanded the threat landscape, with a 161% surge in attacks targeting these channels.

Perception Point's 2023 Annual Report: Cybersecurity Trends & Insights' analyses the most prevalent cyber attack trends amidst today's complex threat landscape, identifying an overall increase of 87% in the total number of attacks over the course of last year.

Perception Point is a Prevention-as-a-Service company deivering next-generation detection and response to all attacks across email, cloud collaboration channels and web browsers. According to their report, attackers are  developing sophisticated techniques to breach organisations, resulting in a significant increase in advanced phishing attacks, with a 356% rise in such attacks attempted by threat actors in 2022.

Overall in 2022, the total number of attacks increased by 87%, demonstrating the escalating threat that cyber attacks pose to organisations. 

Phishing attacks accounted for 67.4% of all attacks in 2022, while Business Email Compromise (BEC) attacks grew by 83%. This is when cyber criminals impersonate legitimate businesses and leverage social engineering techniques as well as thread hijacking to obtain large sums of money or confidential data, are often difficult for traditional email security solutions to detect.

These types of attacks, which are text-based, target individual employees, who are the weakest link in an organisation's security chain, even when they are highly trained.

Throughout 2022, Perception Point’s team analysed several concerning trends. Firstly, malicious actors continue to gain widespread access to new tools and advances in artificial intelligence (AI) and machine learning (ML) which simplify and automate the process of generating attacks.

Attackers are increasingly able to effortlessly launch sophisticated attacks, many of which are characterised by social engineering as well as evasion techniques, such as URL redirection, which make it difficult for the victim to identify them as malicious.

The research also identifies how the threat landscape is changing due to the rapid adoption of new cloud collaboration apps, cloud storage, and services for productivity and external collaboration. “As the global threat landscape continues to evolve, we are sharing vital data that portrays the meteoric rise in the number of attacks, combined with increasingly sophisticated attack techniques that are designed to breach and damage organisations,” said Yoram Salinger Perception Point's CEO.

Perception Point:   PR Newswire:     Dark Reading:     Infosecurity Magazine:     HelpNetSecurity:  

You Might Also Read: 

The Seven Stages Of Cyber Resilience:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Iranian Hackers Using Windows Kernel Driver
Musk's Brain Chip Firm Gets US Approval for Human Analysis »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

Join our experts as they give the insights you need to power your Security Information and Event Management (SIEM).

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

TBG Security

TBG Security

TBG provides a portfolio of services including cyber security, compliance and continuity solutions.

Identity Theft Resource Center (ITRC)

Identity Theft Resource Center (ITRC)

ITRC is a non-profit organization established to empower and guide consumers, victims, business and government to minimize risk and mitigate the impact of identity compromise and crime.

44CON

44CON

44CON is an Information Security Conference & Training event taking place in London. Designed to provide something for the business and technical Information Security professional.

Centre for International Governance Innovation (CIGI)

Centre for International Governance Innovation (CIGI)

CIGI research areas include Conflict Management & Security which encompass cyber security and cyber warfare.

FIRST Conference

FIRST Conference

Annual conference organised by the Forum of Incident Response and Security Teams (FIRST), a recognized global leader in computer incident response.

sic[!]sec

sic[!]sec

sic[!]sec provide products and services for web application security.

SIS Certifications (SIS CERT)

SIS Certifications (SIS CERT)

SIS Certifications is an ISO certification body serving more than 10,000 clients in over 15 countries worldwide.

Slice

Slice

Slice offer subscription based Cyber Insurance for small businesses.

Peraton

Peraton

Peraton provides innovative solutions for the most sensitive and critical programs in government today, developed and executed by scientists, engineers, and other experts.

LeadingIT

LeadingIT

Leading IT provides IT support, cloud computing, email support, cybersecurity, networking and firewall services to Chicagoland businesses.

Lockheed Martin

Lockheed Martin

Lockheed Martin deliver full-spectrum cyber capabilities and cyber resilient systems to defense, intelligence community and global security customers.

McAfee

McAfee

McAfee is a worldwide leader in online protection. We’re focused on protecting people, not devices. Our solutions adapt to our customers’ needs and empower them to confidently experience life online.

VLC Solutions

VLC Solutions

VLC Solutions is an independent solutions and technology service provider offering Cloud Services, Cybersecurity, ERP Services, Network Management Services, and Compliance Solutions.

Phylum

Phylum

Phylum provides powerful, automated software supply chain risk analysis that protects organizations, defends developers and enables secure innovation.

42Crunch

42Crunch

42Crunch provides API security testing and threat protection. We proactively test, fix and protect your APIs from development to runtime.

Verastel

Verastel

Specializing in the niche space of proactive cyber-defense, and adaptive resilience, team Verastel is bolstering enterprise digital security like never before.