A growing body of evidence, outlined in Flashpointโsย State of Cyber Threat Intelligence: 2023ย report, demonstrates just how extensively cyber threats are overlapping, intersecting, and relating. The risk intelligence firm examines why these threatsโfrom the online spaces in which cybercriminals operate to the tactics, techniques, and procedures (TTPs) they use to execute their attacksโare cyclical and what that means from an intelligence and security perspective.
These two themesโconvergence and the cyclical nature of cybercrimeโare front and centre in this report, which examines the factors that feed these unending cycles, their evolving interconnectedness, the real impact they have on the effectiveness of cyberattacks, and the targets they affect.
โConsider the cycle of illicit communities, which is marked by the motions of takedowns (Raid Forums), resurrections (AlphaBay), and new venues (Libre) which may then be taken down,โ according to the reportโs intro. โCall it a game of cat-and-mouse, of chicken-and-egg. To aim to understand where this cycle begins and ends, however, is to miss the point. Like other cycles in the threat landscape, the cycle of illicit markets should be viewed as a converged, self-serving mechanism whose continuity is fuelled by competition, evolving technology, communication preferences, law enforcement partnerships, know-how and other intangibles, and much more. And, like most modern organisations, threat actors employ multiple teams or individuals, with varying motivations and targets, as well as various tools to streamline the tasks that contribute to their main goalโthe compromise of a victimโs systems.โ
Last year, 4,518 data breaches were reported, according to Flashpointโs collections. Threat actors exposed or stole 22.62 billion credentials and personal records, ranging from account and financial information to emails and Social Security numbers.
Flashpointโs research and experience have demonstrated time and again that security practitioners seeking to better understand and protect their enterprises should thinkโand actโaccordingly.
Organisations cannot afford to view, prepare for, mitigate, and prevent these threats in silos, as though one threat (and the cycle it exists in) is separate from another. Multiple disjointed feeds and solutions make identifying, prioritising, and mitigating persistent and evolving threats difficult and costly. Since threat vectors are converging, CISOs should aim to unify and rally their security and intelligence teams behind a single source of truth that integrates workflows between their Cyber Threat Intelligence (CTI), Fraud, Vulnerability Management (VM), and IT Security teams, as well as other functions.
It is through this lens that we examine the trends, data, analysis, strategies, and insights that will impact the ways in which security and intelligence teams tackle challenges in 2023. The full report can be downloadedย here.
About Flashpoint
Trusted by governments, commercial enterprises, and educational institutions worldwide, Flashpoint helps organisations protect their most critical assets, infrastructure, and stakeholders from security risks such as cyber threats, ransomware, fraud, physical threats, and more. Leading security practitionersโincluding physical and corporate security, cyber threat intelligence (CTI), vulnerability management, and vendor risk management teamsโrely on the Flashpoint Intelligence Platform, comprising open-source (OSINT) and closed intelligence, to proactively identify and mitigate risk and stay ahead of the evolving threat landscape. Learn more atย flashpoint.io.