Loading...

10 May 2026 01:40

Editor's Pick Tech & Start Up

Positive Technologies: four out of five attacks targeted in nature

Positive Technologies: four out of five attacks targeted in nature

Positive Technologies has analyzed the relevant cyberthreats of Q2 2023. According to the report, the number of targeted attacks increased by 10% since the beginning of the year, now standing at 78%.

Experts noted large-scale attacks that exploited vulnerabilities and numerous leaks of users’ personal data. Furthermore, the period saw an increase in successful cyberattacks on blockchain projects and an upsurge in ransomware activity targeting IT companies.

The report also shows that the number of incidents in Q2 2023 rose by 17% year-on-year. Successful cyberattacks on businesses commonly resulted in leakage of confidential information (67%) and disruption of core operations (44%).

Ransomware attacks grew by 13% in Q2 2023. Positive Technologies noted an increased share (11%) of IT organizations in the total number of ransomware victims. According to the experts, a possible reason for that growth could be that successful attacks allow cybercriminals to get to confidential client data.

Positive Technologies analysts recorded a new trend. Cybercriminals increasingly forgo encryption and threaten their victims with publishing the stolen data, rather than asking to pay a ransom for data decryption.

“We’ve been seeing attackers gradually abandon data encryption as their key means of pressuring victims. Using ransomware requires attackers to exert significant effort to bypass malware defenses and deploy the malware,” comments Positive Technologies research analyst Natalia Yushkova, “The added risk here is that the attackers may try using the stolen data for repeat attacks. Companies that find themselves under attack must promptly look for points of compromise and vulnerabilities, and make sure the criminals did not leave any backdoors open.”

Positive Technologies found that malicious actors continued to take advantage of older vulnerabilities along with new ones. Certain incidents suggest that vulnerabilities may be exploited again years after being discovered. Therefore, Positive Technologies experts recommend that companies set up a vulnerability management process by inventorizing all their infrastructural assets, finding vulnerabilities, ranking these by severity and comparing against trends , setting up software update policies, and monitoring remediation progress. VM (vulnerability management) systems can help with building that kind of process at companies.

Positive Technologies analysts recorded a trend for using spyware in attacks against individuals: cybercriminals employed that type of malware in 62% of all attacks, which was 23 percentage points above Q1 2023. Notably, the team at the Positive Technologies Expert Security Center (PT ESC) managed to discover a new stealer in Q2. It searches for files in the home directory and on local drives, and then sends these files to the C&C server, along with screenshots and the contents of the clipboard.

According to Positive Technologies assessments, blockchain projects remain an attractive target for attackers. These were attacked twice more frequently in Q2 2023 than in Q1. The biggest incident was the cyberattack on the owners of cryptocurrency exchange servers in Discord, resulting in $3 million stolen.

Q2 2023 was notable for several successful cyberattacks that had a major negative impact. The attack on the German IT services provider Bitmarck forced the company to shut down all of its client-facing and internal systems. This disrupted the operations of many health insurers, who could not get access to patient medical records, process digital sick leaves, or provide other online services. DDoS attacks on Microsoft cloud services prevented a number of companies from using email: Outlook was inaccessible to a total of 18,000 users as the attack reached its peak.

Hardening the network perimeter with the help of web application firewalls would be a key step toward a higher standard of corporate cybersecurity. To prevent malware infection, we recommend that you use sandboxes to analyze the behavior of files in a virtual environment and detect any malicious activity. Positive Technologies experts strongly recommend that you treat incoming email, instant messages, and messages you get on social media with caution and refrain from clicking any suspicious links.

(Visited 21 times, 1 visits today)
peri hokiperihokiduta76duta 76AWSBEThttps://sintnicolaasschool.com/https://abc1131aa.com/kincir88cakar76Slot mahjonghttps://www.abc1131.it.com/stc76006 sinkronisasi momentum strategi hibrida pola scatter mahjong wild deluxe gates of olympus manajemen risiko dadu sicbo007 rekayasa taktik hibrida pola transformasi gold simbol mahjong ways 2 pgsoft baccarat prediksi starlight princess008 arsitektur kemenangan terpadu navigasi strategi blackjack optimasi peluang sweet bonanza mahjong wins 3 pragmatic009 dekonstruksi momentum strategi eksploitasi pola scatter mahjong ways 2 pgsoft teknik unit roulette wild west gold010 manifesto ekspertis navigasi rtp live sugar rush pola statis sv388 taktik kalkulasi blackjack mahjong wins 3 pragmatic011 rekayasa taktik lintas platform optimasi teknik analisa statistik mahjong wild deluxe gates of olympus dadu sicbo012 sinkronisasi data teknik rtp live mahjong ways 2 pgoft strategi baccarat statis dan dinamis starlight princess013 sinergi operasional integrasi teknik analisa statis blackjack dinamika sweet bonanza mahjong wins 3 pragmatic014 manifesto ekspertis rekayasa peluang algoritma pgsoft mahjong ways 2 pgsoft dinamika roulette wild west gold015 protokol strategis optimasi teknik analisa mahjong wins 3 pragmatic sugar rush sv388 blackjack proeksekusi taktik analisa pola gates of olympus dadu sicbo mahjong wild deluxetaktik peluang baccarat teknik analisa pola rtp live starlight princess mahjong ways 2 pgsoftsinergi strategi analisa peluang blackjack taktik teknik pola rtp live mahjong wins 3 pragmatic sweet bonanzaanalisa teknik peluang roulette taktik pola strategi rtp live mahjong ways 2 pgsoft wild west goldstrategi peluang blackjack analisa sv388 teknik taktik pola rtp live mahjong wins 3 pragmatic sugar rushanalisis algoritma pola mahjong ways 2026teknik baca grafik volatilitas pragmaticsinkronisasi jam main analis profesionalbedah mekanik wild bounty showdownframework manajemen risiko sesi panjangpsikologi fitur tumble pergerakan simboldialektika rtp vs hit rate digitalstudi kasus starlight princess 1000masa depan algoritma hiburan digital 2026audit mandiri evaluasi strategi bermainanalisis mekanik scatter hitam mahjong winsdinamika pengali mahjong ways 2sinyal transisi sesi mahjong winsstruktur probabilitas mahjong waysevolusi engine scatter hitam 2026aws algoritma mahjong ways fluktuasi simbol teknisaws cara ukur efisiensi pola mahjongaws integrasi otomatis manual mahjong waysaws kalibrasi strategi mahjong wild rtp gates olympusaws kalkulasi rtp mahjong wins tiga teknisaws observasi teknis simbol mahjong winsaws pola trik rtp mahjong waysaws strategi awet mahjong black scatteraws tren dominasi fitur black scatteraws trik pola naga emas mahjongreview lengkap fitur mahjong wild deluxe ketegangan dadu sicbo keajaiban gates of olympusteknik profesi pola transformasi mahjong ways 2 pgsoft sistem taruhan roulette sticky wild west goldalasan mahjong wins 3 pragmatic blackjack sugar rush menjadi game viral platform sv388 terbarue5 peran strategis rtp live evolusi onlinee5 pola mahjong wins terlihat mengandung scattere5 rahasia alur simbol mahjong winse5 rahasia mahjong simbol scatter mahjonge5 rtp live pilar penting kasino onlinee5 teknik cerdas pola algoritma waktuaws analisis jam hoki rtp olympusaws era multiplier turbo starlight olympusaws fase transisi mahjong pgsoft algoritmaaws komputasi data rtp mahjong waysaws mitos fakta jam hoki olympusaws momentum scatter merah mahjong waysaws rekapitulasi data log mahjong waysaws rotasi fitur captains bounty analisisaws strategi transparan rtp starlight princessaws visual turbo lucky neko starlightstrategi masterclass bedah algoritma mahjong wild deluxe rumus dadu sicbo pola petir gates of olympusteknik rahasia pro player ritme taruhan mahjong ways 2 strategi baccarat multiplier starlight princesspanduan manajemen saldo taruhan mahjong wins 3 pramgatic teknik martingale blackjack sweet bonanza256257258259260261262263264265logika scatter hitam mahjong winsanalisis algoritma mahjong ways 2dinamika frame emas mahjong waysmisteri frekuensi scatter hitamkomparatif mahjong wins vs waysnavigasi sesi stabil mahjong waystransformasi intensitas tumble mahjongprobabilitas scatter hitam 2026pengaruh latensi server mahjong waysevaluasi mekanik mahjong winspola wild bandito rtp livemahjong wins pola scatter wild Top