DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Tech News

Sophos: Digital detritus leaves businesses vulnerable to attacks on network edge devices

DigitalCIO Bureau by DigitalCIO Bureau
April 22, 2025
in Tech News
0
Sophos Acquires Secureworks For $859 Million
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Sophos has released its Annual Threat Report 2025: Cybercrime on Main Street, which sheds light on the biggest security threats small and medium-sized businesses faced in 2024. According to the report, the number one way attackers infiltrated networks was through network edge devices like firewalls, routers, and VPNs, accounting for the initial compromise in nearly 30% of cases.

“Over the past several years, attackers have aggressively targeted edge devices,” said Sean Gallagher, principal threat researcher at Sophos. “Compounding the issue is the increasing number of end-of-life (EOL) devices found in the wild – a problem Sophos calls digital detritus. Because these devices are exposed to the internet and often low on the patching priority list, they are a highly effective method for infiltrating networks.”

The report found that VPNs were the most frequent compromise point, accounting for over 25% of all incidents and 25% of ransomware and data exfiltration events. “Attackers don’t have to deploy custom malware anymore,” Gallagher explained. “Instead, they can exploit businesses’ own systems, increasing their agility and hiding in the places security leaders aren’t looking.”

Other key findings from the Sophos report include:

  • Ransomware still the biggest threat: Ransomware accounted for over 90% of incident response cases involving midsized organizations, and 70% of cases involving small businesses.
  • MFA is no longer enough: Attackers are bypassing multi-factor authentication through adversary-in-the-middle authentication token capture, using phishing platforms to mimic the authentication process and steal credentials.
  • Attackers favor commercial Remote access tools: The most frequently abused legitimate, trusted tools were commercial remote access tools, involved in 34% of incident response and managed detection and response cases.
  • Attackers are evolving their social engineering tactics: Attackers are turning to the abuse of QR codes (quishing) and phone messages (vishing) to compromise businesses, as well as email bombing – sending thousands of spam emails in as little as one or two hours.
Tags: Digital detritusSophos
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

New Relic Appoints Simon Rizkalla VP of Customer Advocacy for Asia-Pacific and Japan

by DigitalCIO Bureau
October 16, 2025
0
New Relic Appoints Simon Rizkalla VP of Customer Advocacy for Asia-Pacific and Japan

New Relic has announced the appointment of Simon Rizkalla as Vice President of Customer Advocacy for Asia-Pacific and Japan (APJ). Rizkalla brings over 25 years of enterprise SaaS, AI,...

Read moreDetails

F5 Networks Victim of Advanced Cyberattack: BIG-IP Source Code Stolen

by DigitalCIO Bureau
October 16, 2025
0
Mass scanning of Palo Alto Networks, Cisco and Fortinet Login portals

Security firm F5 has announced that it has been the victim of a highly sophisticated cyberattack by suspected threat hackers linked to a nation-state. The attackers managed to...

Read moreDetails

Gartner: AI-optimized cloud infrastructure growing rapidly

by DigitalCIO Bureau
October 15, 2025
0
Infosys: Over $300 billion In Corporate Cloud Commitments Remain Untapped

AI-optimized infrastructure as a service (IaaS) is emerging as the next disruptive growth engine for AI infrastructure. As a result, end-user spending is projected to grow 146% by...

Read moreDetails

OpenAI and Broadcom to Build 10 Gigawatts of AI Infrastructure

by DigitalCIO Bureau
October 15, 2025
0

OpenAI and Broadcom have announced a collaboration for 10 gigawatts of custom AI accelerators. OpenAI will design the accelerators and systems, which will be developed and deployed in...

Read moreDetails

AI Skillsets Critical to Cybersecurity Skills Gap Solution

by DigitalCIO Bureau
October 14, 2025
0
Fortinet Expands Universal SASE Coverage with Two New India-Based Data Centres   

Fortinet has released its 2025 Global Cybersecurity Skills Gap Report, shedding light on the new and persistent challenges organizations face due to the cybersecurity skills gap. The global...

Read moreDetails
Next Post
Acronis Report Unveils Rise in Ransomware, AI-Driven Attacks, and Malware Risks

Acronis Prevents Over 7.5 Million Attacks

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

L&T Tech Services Accelerates Transition to Smart Vehicles with Generative AI on AWS

GenAI-led Productivity Gains to be in Range of 20-40%: Axis Capital

January 22, 2025
UST Opens New Office and Generative AI Experience Center in Cyberjaya, Malaysia

UST Opens New Office and Generative AI Experience Center in Cyberjaya, Malaysia

November 18, 2024

How DigiLocker Helps Paperless Verification in India

May 10, 2019

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud HCLTech Honeywell IBM Infographics Internet of Things (IoT) Kaspersky Microsoft Netskope NTT DATA Palo Alto Networks Panel Discussion Qlik Salesforce Sophos Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?