Despite increased spending on global security services, a recent report found that 100 percent of web applications are still vulnerable to cyberattacks. Although the study, conducted by security firm Trustwave, pegged just 8 percent of these vulnerabilities as high-risk or critical, the sheer volume of exploitable flaws means that cybercriminals’ persistence will likely pay off.

Targeted Attacks and Security Spending on the Rise

As noted by TechRepublic, cyberattack vectors are evolving. For example, while the volume of spam emails has dropped significantly over the last 10 years, threats such as PDF phishing, in which attackers send legitimate-looking PDFs that contain links to malicious sites, are on the rise.

While the Trustwave report found that high-profile arrests and increased corporate scrutiny has limited the impact of as-a-service exploit kits, “compromised webpages are too tempting a vector for exploitation for attackers to ignore it for long … inevitably, serious players will perceive a gap in the ‘market’ and fill it.” As a result, cybercriminals are shifting from large-volume exploit kits to more targeted attacks that leverage commonly shared vulnerabilities.

Cybersecurity spending, meanwhile, is on the rise. Gartner predicted that global security services spending will reach $96 billion in 2018 as companies look for ways to mitigate emerging threats and protect critical data. But given the ubiquity of web application vulnerabilities, as noted by the Trustwave report, spending alone won’t solve the problem.

“It is clearer than ever that everyone who relies on today’s technology — not just security and IT professionals — must adopt an informed defensive stand to protect themselves from attack,” the report’s authors wrote.

Improving Global Security Services

Trustwave noted that both frequent system upgrades and rigorous patch management will be required to reduce the number of data breaches. According to CSO Online, enterprises can boost the cybersecurity bottom line by adopting an adversary mindset — that means gathering intelligence on adversaries and using this information to design effective defenses.

Security professionals “should also ensure that employee cybersecurity training is in place at their organization to decrease the likelihood of someone accidentally opening a malicious file or link on a work machine,” according to TechRepublic. This is critical because most attacks start with unintentional downloads, link clicks or email replies.

Finally, another CSO Online article noted that companies are sometimes reluctant to share threat data because these issues are often perceived as IT problems that should be solved internally. But according to GCN, cybersecurity partnerships provide strength in numbers by allowing companies “to better share threat information and provide tactical cybersecurity training to IT staff.”

More from

Is It Time to Start Hiding Your Work Emails?

In this digital age, it is increasingly important for businesses to be aware of their online presence and data security. Many companies have already implemented measures such as two-factor authentication and strong password policies – but there is still a great deal of exposure regarding email visibility. It should come as no surprise that cyber criminals are always looking for ways to gain access to sensitive information. Unfortunately, emails are a particularly easy target as many businesses do not encrypt…

2022 Industry Threat Recap: Finance and Insurance

The finance and insurance sector proved a top target for cybersecurity threats in 2022. The IBM Security X-Force Threat Intelligence Index 2023 found this sector ranked as the second most attacked, with 18.9% of X-Force incident response cases. If, as Shakespeare tells us, past is prologue, this sector will likely remain a target in 2023. Finance and insurance ranked as the most attacked sector from 2016 to 2020, with the manufacturing sector the most attacked in 2021 and 2022. What…

X-Force Prevents Zero Day from Going Anywhere

This blog was made possible through contributions from Fred Chidsey and Joseph Lozowski. The 2023 X-Force Threat Intelligence Index shows that vulnerability discovery has rapidly increased year-over-year and according to X-Force’s cumulative vulnerability and exploit database, only 3% of vulnerabilities are associated with a zero day. X-Force often observes zero-day exploitation on Internet-facing systems as a vector for initial access however, X-Force has also observed zero-day attacks leveraged by attackers to accomplish their goals and objectives after initial access was…

And Stay Out! Blocking Backdoor Break-Ins

Backdoor access was the most common threat vector in 2022. According to the 2023 IBM Security X-Force Threat Intelligence Index, 21% of incidents saw the use of backdoors, outpacing perennial compromise favorite ransomware, which came in at just 17%. The good news? In 67% of backdoor attacks, defenders were able to disrupt attacker efforts and lock digital doorways before ransomware payloads were deployed. The not-so-great news? With backdoor access now available at a bargain price on the dark web, businesses…