Rapid7's 2024 Attack Intelligence Report was released today and includes insights from 14 months of vulnerability and exploit analysis, thousands of ransomware incidents, 180+ APT campaigns, and a year+ of Rapid7 incident response findings.

https://www.rapid7.com/research/report/2024-attack-intelligence-report/

Get The 2024 Attack Intelligence Report - by Rapid7 Labs Research

Rapid7 Labs has upped the ante with the 2024 Attack Intelligence Report, a 14-month look at attacker behaviors. Explore key findings and get expert advice.

Rapid7

Among our 2024 findings:

* In 2023, for the second time in three years, more mass compromise events arose from zero-day vulnerabilities than from n-day vulnerabilities. 53% of net-new widespread threat CVEs through the beginning of 2024 were exploited as 0day.

* Nearly a quarter (23%) of mass compromise events arose from well-planned, highly orchestrated zero-day attacks in which a single adversary compromised dozens or hundreds of organizations in one fell swoop, often leveraging custom tooling like proprietary exploits and backdoors.

* 5,600+ tracked ransomware incidents shed more light on the global menace ransomware has become to consumers, businesses, governments, and society.

* 41% of incidents Rapid7 IR saw in 2023 involved remote access to systems without MFA.

@catc0n hmm, no direct link? :-(
Maybe you could send this to your Marketing team please

https://infosec.exchange/@gnyman/112372781706295745

If Verizon can do it, so can you. The alternative is that I (and everyone else) just enters some BS info to get the report which just leads to a bad marketing database, which in turns leads to the emails ending up in spam. Bad cycle, I'll bet anyone in your marketing team an Ice Cream that not giving people the option to bypass is a net-negative.

Gabriel :verified_paw: (@[email protected])

Attached: 1 image Thank you kind soul at Verizon who keep saying no to sales/marketing #DBIR2024

Infosec Exchange
@gnyman happy to pass on the feedback — unfortunately, I'm not allowed to give out the ungated link publicly. I'm sure non-R7 folks can share the PDF directly though!