Insurance

Top 10 cyber incidents during 2024 revealed

  1. Crowdstrike outage: A flawed software update in July broke 8.5 million devices worldwide, causing financial losses of $5.4 billion. Although the cybersecurity company quickly resolved the recovery effort, manual intervention was still required.
  2. Changing Healthcare Ransomware Attacks: In February, a ransomware attack affected more than 100 million people in the United States, paralyzing healthcare operations and causing $4.457 billion in financial losses.
  3. CDK global attack: Automotive software provider CDK Global faced a ransomware breach in June that affected nearly 15,000 dealers in North America. Subsequent attacks complicated recovery.
  4. Israel-Hamas Cyber ​​Conflict: In the ongoing conflict, cyber incidents involving kinetic attacks have caused casualties and damage across the region, highlighting the intersection of physical and digital warfare.
  5. Openssh vulnerability: A zero-day exploit in July exposed more than 7 million Openssh server instances, highlighting the urgent need for proactive software security measures.
  6. XZ UTILS COMPROMISE: A critical vulnerability in an open source library was discovered in March, averting a potential global supply chain attack. The investigation linked the breach to long-term actions by unidentified actors.
  7. Ivanti VPN vulnerability: Breaches in January and February exposed critical remote access systems, posing risks to enterprise security and supply chains.
  8. Salt Typhoon Espionage: Chinese state-sponsored hackers are targeting global telecommunications infrastructure, compromising surveillance systems and raising concerns about supply chain resiliency.
  9. Blue yonder ransomware attack: A breach in November disrupted retail and grocery supply chains in the United States and the United Kingdom, affecting operations during peak shopping periods.
  10. Snowflake Data Breach: A possible attack on cloud providers exposing customer data in industries including finance and retail is attributed to weak authentication practices in customer environments.

The report also discusses industry-wide risks, such as reliance on cloud providers, and highlights strategies for resilience. These include adopting a multi-cloud framework, integrating edge computing, and implementing endpoint detection and response (EDR) diversification.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button