Leading 3 Risks Overview for the Second Quarter of 2024

September 12, 2024The Hacker NewsThreat Intel / Cybersecurity

Cato CTRL (Cyber Threats Research Lab) has unveiled its Q2 2024 Cato CTRL SASE Threat Report. The report showcases significant discoveries derived from the scrutiny of a whopping 1.

Top 3 Threat Report Insights for Q2 2024

September 12, 2024The Hacker NewsThreat Intel / Cybersecurity

Top 3 Threat Report Insights for Q2 2024

Cato CTRL (Cyber Threats Research Lab) has unveiled its Q2 2024 Cato CTRL SASE Threat Report. The report showcases significant discoveries derived from the scrutiny of a whopping 1.38 trillion network flows from over 2,500 of Cato’s worldwide clients, during the period from April to June 2024.

Key Notions from the Q2 2024 Cato CTRL SASE Threat Report

The report includes distinctive insights based on a comprehensive study of network flows. Here are the top three insights essential for corporations.

1) IntelBroker: A Prolific Threat Actor in the Cyber Underworld

Following an extensive exploration of hacking circles and the deep web, Cato CTRL pinpointed a notorious threat actor going by the alias IntelBroker. IntelBroker is a well-known personality and administrator within the BreachForums hacking community, actively engaged in vending data and source code from major firms. These encompass AMD, Apple, Facebook, KrypC, Microsoft, Space-Eyes, T-Mobile, and the US Army Aviation and Missile Command.

2) 66% of Brand Counterfeiting Focused on Amazon

Cybersquatting entails counterfeiting and exploiting a brand’s domain name to benefit from its recognized trademark. The report highlights that Amazon was the most commonly counterfeited brand, with 66% of such domains targeting the e-commerce giant. Google registered a distant second position, with just 7%.

3) Log4j Continues to Be Exploited

Despite its exposure in 2021, the Log4j vulnerability remains a favored instrument among threat actors. From the first quarter to the second quarter of 2024, Cato CTRL documented a 61% surge in attempted Log4j exploits in incoming traffic and a 79% escalation in WANbound traffic. Likewise, the Oracle WebLogic vulnerability, initially identified in 2020, saw a 114% uptick in exploitation attempts within WANbound traffic over the same timeframe.

Security Suggestions

In line with the insights from the report, Cato CTRL suggests that organizations embrace the following optimal methodologies:

  1. Consistently monitor dark web forums and marketplaces for any references to your company’s data or credentials being traded.
  2. Implement tools and methodologies to detect and neutralize phishing and other cyber attacks utilizing cybersquatting.
  3. Institute a proactive patching regime concentrating on critical vulnerabilities, especially those actively targeted by threat actors, such as Log4j.
  4. Draft a systematic strategy for addressing a data breach.
  5. Adopt an “assume breach” attitude employing approaches like ZTNA, XDR, penetration testing, and more.
  6. Formulate an AI governance blueprint.

Delve into additional recommendations and more detailed insights within the report.

Stumbled upon this article? This article is a contributed piece from one of our esteemed affiliates. Keep track of us on Twitter and LinkedIn to peruse more exclusive content we share.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.