Tag: data breaches

  • Cloud Ransomware Attacks Surge as Organizations Struggle with Security

    Cloud Ransomware Attacks Surge as Organizations Struggle with Security

    A recent report by Rubrik reveals alarming trends in cyberattacks, with a staggering 90% of IT and security leaders reporting that their organizations faced a cyberattack in the past year. The persistence of ransomware attacks and a growing reliance on hybrid cloud environments highlight the urgent need for enhanced security measures, as many firms are left vulnerable due to misconceptions regarding their cloud service providers’ responsibility for data protection.

    Joe Hladik, Head of Rubrik Zero Labs, noted that the continued exploitation of hybrid cloud vulnerabilities indicates that cybercriminals remain ahead of the game. The report emphasizes that organizations must adopt a proactive approach to safeguarding their most valuable data and prioritize a data-centric security strategy that emphasizes visibility and quick recovery mechanisms. “The need for a data-centric security strategy that prioritizes visibility, control, and quick recovery has never been more urgent,” Hladik stated.

    The report also pointed out that nearly one-fifth of organizations faced over 25 cyberattacks in 2024 alone, averaging at least one breach every other week. The most prevalent attack vectors included data breaches (30%), malware on devices (29%), cloud or SaaS breaches (28%), phishing (28%), and insider threats (28%). The consequences of these attacks were significant, with 40% of respondents experiencing increased security costs and 37% noting reputational damage and lost customer trust.

    Despite the inevitable shift towards cloud adoption, challenges such as understanding application dependencies and managing hybrid environments continue to hinder full implementation. Approximately 90% of IT and security leaders manage hybrid cloud setups, with half reporting that most of their workloads have transitioned to the cloud. However, a prevalent misconception persists: the belief that cloud providers will entirely safeguard their users’ data, which often leads to a false sense of security.

    The report underscores the crisis in data recovery strategies, as 86% of organizations that experienced successful ransomware attacks last year reported paying a ransom to recover their data. Alarmingly, 74% of these organizations indicated that threat actors compromised their backup and recovery systems. With the increasing use of multiple cloud platforms—92% of organizations are utilizing two to five—it is evident that weak points in identity and access management are being exploited, exacerbating the ransomware threat.

    Insider threats are also a growing concern, with 28% of IT leaders highlighting that compromised credentials often drive these incidents. Moreover, a significant portion of high-risk sensitive files contains valuable digital data such as API keys and usernames, which are particularly attractive targets for cybercriminals seeking to hijack identities and breach critical systems.

  • Cyber Threats to Automotive Industry Surge in 2025

    Cyber Threats to Automotive Industry Surge in 2025

    Amid growing concerns over cybersecurity, security incidents affecting the automotive and mobility industries surged by nearly 50% in the first quarter of 2025, according to recent data released by Upstream Security. Researchers tracked a staggering 148 publicly disclosed incidents in the first three months alone — a trajectory that, if it continues, could exceed the total of 409 incidents reported in 2024.

    Of significant concern is the rise of ransomware attacks, which accounted for 45% of the incidents observed. A prominent case involved Tata Technologies, an India-based automotive and aerospace service provider that faced severe disruption to its IT systems. After a month of turmoil, a group named Hunters International claimed responsibility for the attack, releasing approximately 730,160 stolen company files onto the Dark Web.

    With ransomware increasingly common within the automotive sector, experts warn that attackers often exploit compromised credentials to gain entry into systems. Yaniv Maimon, Upstream’s vice president of cyber services, noted that attackers could impersonate dealers or original equipment manufacturer (OEM) employees to gather sensitive data, access customer vehicle locations, and even manipulate vehicles remotely. Maimon adds that about 26% of the recorded incidents could have led to direct manipulation of vehicles on roads, heightening public safety concerns.

    The broader threat landscape also reveals that 63% of the incidents were classified as data breaches or privacy-related incidents, with half posing risks of significant disruptions to services or business operations. Upstream emphasizes that many of these incidents could potentially affect millions of vehicles, reflecting a troubling trend in the industry. Additionally, the number of threat actors targeting automotive and mobility has risen dramatically from 300 to over 1,100 within the past year.

  • Cybersecurity Risks with Third-Party Identity Providers Prompt New Solutions

    Cybersecurity Risks with Third-Party Identity Providers Prompt New Solutions

    Identity management has become a critical focus in the cybersecurity landscape, as businesses seek to protect their systems against increasingly sophisticated attacks. As highlighted by research from Verizon, a staggering 80% of data breaches are attributed to weak or stolen passwords, underscoring the importance of robust identity verification processes.

    The trend toward adopting third-party identity providers (IdPs) is accelerating, with nearly 70% of organizations having implemented single sign-on (SSO) solutions or planning to do so. These solutions offer aggregated threat intelligence and advanced security features that can substantially mitigate risks. However, experts warn that IdPs come with their own set of vulnerabilities, most notably the potential for backdoor access.

    Historical precedents underscore the dangers associated with IdPs. Recent incidents, such as the FBI’s demand for a backdoor into iPhones and reports of the UK government ordering Apple to create similar access, exemplify the risks that may arise when sensitive operations are outsourced to third parties.

    In response to these vulnerabilities, cybersecurity professionals are exploring innovative solutions, such as extra-factor authentication, which provides an additional layer of verification not controlled by the IdP. This strategy ensures that even if an IdP’s security is compromised, organizations can independently verify user identities. By integrating tools like OpenFGA, Ory Hydra, and Ory Kratos, businesses can implement self-hosted authentication processes that enhance security while maintaining control over access.

    As organizations navigate the complexities of identity management, adopting such proactive measures could prove to be essential in fortifying their defenses against identity-based attacks, restoring confidence in digital transactions and communications.