DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Tech News

Fortinet threat report reveals record Surge in Automated Cyberattacks

DigitalCIO Bureau by DigitalCIO Bureau
May 6, 2025
in Tech News
0
Fortinet, Google Cloud Join Hands For SASE PoP Expansion
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Fortinet has announced the release of the 2025 Global Threat Landscape Report from FortiGuard Labs. The latest annual report is a snapshot of the active threat landscape and trends from 2024, including a comprehensive analysis across all tactics used in cyberattacks, as outlined in the MITRE ATT&CK framework. The data reveals that threat actors are increasingly harnessing automation, commoditized tools, and AI to systematically erode the traditional advantages held by defenders.

“Our latest Global Threat Landscape Report makes one thing clear: Cybercriminals are accelerating their efforts, using AI and automation to operate at unprecedented speed and scale,” said Derek Manky, Chief Security Strategist and Global VP Threat Intelligence, Fortinet FortiGuard Labs. “The traditional security playbook is no longer enough. Organizations must shift to a proactive, intelligence-led defense strategy powered by AI, zero trust, and continuous threat exposure management to stay ahead of today’s rapidly evolving threat landscape.”

Key findings from the latest FortiGuard Labs Global Threat Landscape Report include:

  • Automated scanning hits record highs as attackers shift left to identify exposed targets early.To capitalize on newfound vulnerabilities, cybercriminals are deploying automated scanning at a global scale. Active scanning in cyberspace reached unprecedented levels in 2024, rising by 16.7% worldwide year-over-year, highlighting a sophisticated and massive collection of information on exposed digital infrastructure. FortiGuard Labs observed billions of scans each month, equating to 36,000 scans per second, revealing an intensified focus on mapping exposed services such as SIP and RDP and OT/IoT protocols like Modbus TCP.
  • Darknet marketplaces fuel easy access to neatly packaged exploit kits. In 2024, cybercriminal forums increasingly operated as sophisticated marketplaces for exploit kits, with over 40,000 new vulnerabilities added to the National Vulnerability Database, a 39% rise from 2023. In addition to zero-day vulnerabilities circulating on the darknet, initial access brokers are increasingly offering corporate credentials (20%), RDP access (19%), admin panels (13%), and web shells (12%). Additionally, FortiGuard Labs observed a 500% increase in the past year in logs available from systems compromised by infostealer malware, with 1.7 billion stolen credential records shared in these underground forums.
  • AI-powered cybercrime is scaling rapidly. Threat actors are harnessing AI to enhance phishing realism and evading traditional security controls, making cyberattacks more effective and difficult to detect. Tools like FraudGPT, BlackmailerV3, and ElevenLabs are fueling more scalable, believable, and effective campaigns, without the ethical restrictions of publicly available AI tools.
  • Targeted attacks on critical sectors intensify. Industries such as manufacturing, healthcare, and financial services continue to experience a surge in tailored cyberattacks, with adversaries deploying sector-specific exploitations. In 2024, the most targeted sectors were manufacturing (17%), business services (11%), construction (9%), and retail (9%). Both nation-state actors and Ransomware-as-a-Service (RaaS) operators concentrated their efforts on these verticals, with the United States bearing the brunt of attacks (61%), followed by the United Kingdom (6%) and Canada (5%).
  • Cloud and IoT security risks escalate. Cloud environments continue to be a top target, with adversaries exploiting persistent weaknesses such as open storage buckets, over-permissioned identities, and misconfigured services. In 70% of observed incidents, attackers gained access through logins from unfamiliar geographies, highlighting the critical role of identity monitoring in cloud defense.
  • Credentials are the currency of cybercrime. In 2024, cybercriminals shared over 100 billion compromised records on underground forums, a 42% year-over-year spike, driven largely by the rise of “combo lists” containing stolen usernames, passwords, and email addresses. More than half of darknet posts involved leaked databases, enabling attackers to automate credential-stuffing attacks at scale. Well-known groups like BestCombo, BloddyMery, and ValidMail were the most active cybercriminal groups during this time and continue to lower the barrier to entry by packaging and validating these credentials, fueling a surge in account takeovers, financial fraud, and corporate espionage.

CISO Takeaway: Strengthening Cyber Defenses Against Emerging Threats

Fortinet’s Global Threat Landscape Report provides rich details on the latest attacker tactics and techniques while also delivering prescriptive recommendations and actionable insights. Designed to empower CISOs and security teams, the report offers strategies to counter threat actors before they strike, helping organizations stay ahead of emerging cyberthreats.

This year’s report includes a “CISO Playbook for Adversary Defense” that highlights a few strategic areas to focus on:

  • Shifting from traditional threat detection to continuous threat exposure management: This proactive approach emphasizes continuous attack surface management, real-world emulation of adversary behavior, risk-based remediation prioritization, and automation of detection and defense responses. Utilizing breach and attack simulation (BAS) tools to regularly assess endpoint, network, and cloud defenses against real-world attack scenarios ensures resilience against lateral movement and exploitation.
  • Simulating real-world attacks: Conduct adversary emulation exercises, red and purple teaming, and leverage MITRE ATT&CK to test defenses against threats like ransomware and espionage campaigns.
  • Reducing attack surface exposure: Deploy attack surface management (ASM) tools to detect exposed assets, leaked credentials, and exploitable vulnerabilities while continuously monitoring darknet forums for emerging threats.
  • Prioritizing high-risk vulnerabilities: Focus remediation efforts on vulnerabilities actively discussed by cybercrime groups, leveraging risk-based prioritization frameworks such as EPSS and CVSS for effective patch management.
  • Leveraging dark web intelligence: Monitor darknet marketplaces for emerging ransomware services and track hacktivist coordination efforts to preemptively mitigate threats like DDoS and web defacement attacks.
Tags: Fortinet
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Fractal unveils intelligent sales agents to accelerate B2B growth

by DigitalCIO Bureau
March 11, 2026
0
Fractal unveils intelligent sales agents to accelerate B2B growth

Flyfish.ai now deploys 35+ coordinated AI agents across the sales lifecycle, helping early enterprise adopters close deals up to 30% faster and improve sales productivity by 42%. Fractal...

Read moreDetails

TCS Named a Leader in Artificial Intelligence and Generative AI Services by Everest Group

by DigitalCIO Bureau
March 11, 2026
0
TCS Named a Leader in Artificial Intelligence and Generative AI Services by Everest Group

Cited as key strengths are Tata Consultancy Services platform-led AI transformation strategy, proprietary industry assets, and strong co-innovation with partners Tata Consultancy Services (TCS), has been positioned as...

Read moreDetails

SEI Engages IBM to Accelerate Enterprise Transformation Through Agentic AI

by DigitalCIO Bureau
March 10, 2026
0
SEI Engages IBM to Accelerate Enterprise Transformation Through Agentic AI

SEI announced it has joined forces with IBM IBM to accelerate enterprise transformation through agentic AI and automation and modernize how it operates, innovates, and delivers value to clients—reinforcing...

Read moreDetails

SailPoint redefines identity security with new adaptive identity innovations

by DigitalCIO Bureau
March 10, 2026
0
SailPoint redefines identity security with new adaptive identity innovations

New AI-powered capabilities deliver real-time governance, secure the full spectrum of human and machine identities, and provide integrated threat management for the modern enterprise SailPoint, Inc. today announced...

Read moreDetails

TCS launches Gemini Experience Center in the US to help accelerate AI-powered manufacturing

by DigitalCIO Bureau
March 9, 2026
0
TCS launches Gemini Experience Center in the US to help accelerate AI-powered manufacturing

The seventh TCS GEC globally integrates Google’s Gemini models with TCS’ manufacturing expertise to help accelerate the adoption of Physical AI and build future-ready enterprises Tata Consultancy Services...

Read moreDetails
Next Post
More Than 50% of CDAOs Will Secure Funding for Data Literacy and AI Literacy Programs by 2027

CEOs Believe Their Executive Teams Lack AI Savviness

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

LRN Appoints New Leadership For Asia-Pacific Region

Brillio Welcomes Ashish Singh to its Board of Directors

April 9, 2024
Ascendion acquires UXReactor to drive AI-Powered Experience Design

Ascendion acquires UXReactor to drive AI-Powered Experience Design

April 29, 2025
Proofpoint Appoints Bikramdeep Singh as Country Manager for India

Cyber ​​Risks Increasing: CISOs in India Expect More Attacks

August 27, 2025

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud IBM Infographics Internet of Things (IoT) Kaspersky Microsoft NTT DATA NVIDIA Palo Alto Networks Panel Discussion Qlik Salesforce ServiceNow Sophos TCS Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?