• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Cyber-Attack Surface “Spiralling Out of Control”

You are here: Home / General Cyber Security News / Cyber-Attack Surface “Spiralling Out of Control”
June 7, 2022

Global businesses are continue to beset with cyber visibility and manage troubles, with two-fifths (43%) admitting their electronic attack surface area is out of regulate as a consequence, according to new Trend Micro research.

The security seller polled above 6200 IT and company decision-makers to compile its new review, Mapping the digital attack surface: Why international organisations are struggling to regulate cyber risk.

It uncovered that practically a few-quarters (73%) are involved about the escalating size of their attack surface. In excess of a third (37%) said it is “constantly evolving and messy,” and just fifty percent (51%) believed they were ready to fully determine its extent.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


These visibility worries are best in cloud environments, even though complications persist across the board. The report highlights sophisticated offer chains, device bloat and property doing the job-driven shadow IT as extra contributory things.

On normal, respondents estimated possessing just 62% visibility of their attack surface.

The ongoing follow of guide (24%) and regional (29%) attack surface area mapping is also hampering attempts to attain detailed insight and get rid of knowledge silos, primarily for worldwide organizations – two-thirds (65%) of which admitted the scale of their operations results in supplemental challenges.

“There’s a perception that main investments in IT modernization more than the past few many years have made a momentum that is significantly hard to deal with,” the report mentioned. “Gaining visibility … is certainly the first step towards proficiently mitigating risk.”

Nonetheless in excess of fifty percent (54%) of responding companies explained they never think their approach of evaluating risk exposure is sophisticated ample. This is borne out by other stats from the report, notably that just about two-fifths (35%) only assessment or update their risk publicity month-to-month or fewer regularly.

Very last December, the head of MI6, Richard Moore, warned in a uncommon public speech that “the digital attack area that criminals, terrorists and hostile states threats look for to exploit from us is developing exponentially.


Some pieces of this write-up are sourced from:
www.infosecurity-magazine.com

Previous Post: «apple's new feature will install security updates automatically without full Apple’s New Feature Will Install Security Updates Automatically Without Full OS Update
Next Post: Researchers Warn of Spam Campaign Targeting Victims with SVCReady Malware researchers warn of spam campaign targeting victims with svcready malware»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.