Arctic Wolf Labs
The most forward-thinking ideas from our elite security researchers
10 Cybersecurity Predictions for 2023
Business Email CompromiseBusiness email compromise accounted for over a quarter (29%) of incident response cases last year.
Ransomware-as-a-service (RaaS)The median initial ransom demand across all industries was $500,000 USD.
Publicly Known Vulnerabilities45% of incidents were caused by vulnerabilities that could have been mitigated through available security patches and updates.
Root point of Compromise
External Exposure Trumps User Action
Arctic Wolf Labs has determined that a handful of attack vectors and vulnerabilities were responsible for a significant portion of incidents responded to by Arctic Wolf Incident Response over the last 12 months.* Of the top five vulnerabilities leveraged by threat actors in 2022, four of them were published in 2021. This is noteworthy because human error is often held up as the most vulnerable part of a security environment, while our data shows that external actions from unpatched vulnerabilities is an even greater threat.
"With broader public access to AI, we expect to see more bots and automation spread disinformation across the web. We expect to see AI-generated imagery and videos used by threat actors to spread propaganda, influence public opinion, and launch advanced social engineering campaigns."- - - - - - 2023 Arctic Wolf Labs Threat Report
How to Build a Stronger Security Posture
"We believe sharing intelligence and insights like those in this report is a critical responsibility for those of us in the cybersecurity industry and is vital in helping organizations of all types end cyber risk."- - - - - - 2023 Arctic Wolf Labs Threat Report
- The most common root point of compromise utilized by threat actors, and where you need to place organizational priorities
- How disruptive technologies like cryptocurrency and augmented reality will introduce new possibilities and risks to the threat landscape
- The most notable emerging threat actor tactics, techniques, and procedures (TTPs) and what you can do to thwart them