Resources – CyberSOC Threat Statistics

CyberSOC Threat Statistics

Attack Surface Exposure Categories - Year 2024 (January - Mar)

No Data Found

Exposure Category Definitions

The affected IT assets or services are not configured with the minimum security requirements based on the latest industry standards or best practices to minimize the exposure to the latest cyber threats. This exposure category would also indicate that your IT assets or services are in default configuration state thus becoming the easy targets to the threat actors.

This exposure category indicates that there are vulnerabilities identified due to the outdated components used on your IT assets or services.

There are vulnerabilities and security risks identified on the third party infrastructure that are associated with your organization’s IT assets or services. Third party risks may have direct or indirect impact to the confidentiality, integrity and availability of your IT services and overall business reputation.

The exposure of your user accounts information such as the email addresses of your users in the recent data breach of public sites. The exposed user credentials are highly susceptible to credentials stuffing, account takeover (ATO) and phishing attacks.

This exposure category indicates that your IT service users or customers are susceptible to phishing attack due to the domain spoofing or domain phishing technique used to trick your customers to obtain their login credentials.

This exposure category refer to an intended target of a DDoS attack and misconfigured network services, which are vulnerable to DDoS reflection often over UDP.

This category indicates the data breach of the IT assets or services that involves the Personal Identifiable Information (PII) of your IT users or consumers.

This data of this exposure category is associated with the IP, domain or website reputations of your organization that are categorized as malicious or blacklisted by various cyber intelligence communities. Data is also obtained to identify the leech or pirate websites that are resembling your organization which would have direct branding and reputation impact to your business.

Emergency incident response and security breach / compromise assessment are required to contain and mitigate the active threats.

The findings of this exposure category are related to the unmanaged IT assets (old or unused IT assets), non-production IT assets or services that are NOT supposed to be publicly accessible. The shadow assets would easily become the prime targets of the threat actor to circumvent or compromise your existing security controls.

 

Miscellaneous is to cater for the branding and other specific cyber risk monitoring requirements customized for certain customers. 

Threat Categories - Year 2024

No Data Found

Top Threats - Year 2024

Top 10 Threat Sources By Country

No Data Found

MITRE ATT&CK Analysis - Year 2024

No Data Found