In Q4 2022, Kroll saw ransomware hit a peak, primarily due to the rise in attacks impacting the manufacturing, health care, technology and telecommunications industries. Kroll’s research found that several other familiar threats remained highly active throughout 2022, such as a significant increase in phishing and a notable rise in unauthorized access, increasing from 18% of cases in 2021 to 25% in 2022. Notable new initial access methods included an infection method leveraging Google Ads to spread credential-stealing malware and a rise in the use of USB-borne malware as a means to spread infection throughout a network.
Watch Kroll’s cyber threat intelligence leaders outline notable trends and patterns that emerged in 2022 and how they may affect organizations in the year ahead.
You will learn about:
You can also read the Q4 2022 Threat Landscape Report.
Incident response, digital forensics, breach notification, managed detection services, penetration testing, cyber assessments and advisory.
Stop cyberattacks. Kroll Responder managed detection and response is fueled by seasoned IR experts and frontline threat intelligence to deliver unrivaled response.
Kroll's computer forensics experts ensure that no digital evidence is overlooked and assist at any stage of an investigation or litigation, regardless of the number or location of data sources.
Kroll is the largest global IR provider with experienced responders who can handle the entire security incident lifecycle.
Kroll delivers more than a typical incident response retainer—secure a true cyber risk retainer with elite digital forensics and incident response capabilities and maximum flexibility for proactive and notification services.
Kroll’s Malware Analysis and Reverse Engineering team draws from decades of private and public-sector experience, across all industries, to deliver actionable findings through in-depth technical analysis of benign and malicious code.
Kroll’s ransomware preparedness assessment helps your organization avoid ransomware attacks by examining 14 crucial security areas and attack vectors.
Digital forensic experts investigate hundreds of Office 365 incidents per year and help strengthen your security.
by Keith Wojcieszek, Dave Truman, Stephen Green, George Glass
by Paul Jackson
by Laurie Iacono, Keith Wojcieszek, George Glass
by Marc Brawner, Mark Nicholls