Verizon on Wednesday published its 2024 Data Breach Investigations Report (DBIR), which shows that vulnerability exploitation surged last year.
The DBIR is one of the cybersecurity industry’s most anticipated reports due to the fact that it’s based on the analysis of a significant number of real-world incidents.
For the 2024 DBIR, Verizon analyzed more than 30,000 security incidents and over 10,000 confirmed data breaches. The number of incidents and confirmed breaches has doubled compared to the previous year.
Verizon has highlighted that the exploitation of vulnerability was an initial point of entry in 14% of breaches, which represents a 180% increase compared to the previous year. This surge was partly fueled by the MOVEit attacks and other zero-days leveraged by ransomware groups.
The company also found that it can take 55 days for organizations to address 50% of critical vulnerabilities after patches become available, and it urged defenders to respond faster.
The telecoms giant found that users are increasingly good at identifying phishing attempts. On the other hand, the median time for users to fall for phishing emails — this includes opening the email and entering data on a malicious site — is less than 60 seconds.
In addition, 68% of all breaches involved a non-malicious human element. This refers to an individual falling victim to a social engineering attack or making an error.
Verizon said one-third of the breaches it analyzed involved ransomware or some other type of extortion technique.
“Pure extortion attacks have risen over the past year and are now a component of 9% of all breaches,” Verizon said. “The shift of traditional ransomware actors toward these newer techniques resulted in a bit of a decline in ransomware to 23%. However, when combined, given that they share threat actors, they represent a strong growth to 32% of breaches. Ransomware was a top threat across 92% of industries.”
The full Verizon DBIR 2024 is available in PDF format.
Related: The Battle Continues: Mandiant Report Shows Improved Detection But Persistent Adversarial Success
Related: Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report
Related: SAP Applications Increasingly in Attacker Crosshairs, Report Shows