In the premier issue of our monthly Cyber Risk Monitor, Luke Tenery and Nathan Fisher provide actionable and timely analysis of the most important cyber risk and intelligence trends across the areas of reconnaissance and targeting, initial intrusion vectors and changes to on-network activity perpetrated by threat actors.
- Supply chain intrusions result in more third-party breaches as threat actors move to access enablement operations.
- Several new vulnerabilities drive a renewed emphasis on automated exploitation.
- Poor user account hygiene provides easy, hard to detect, malicious access.
- Ransomware extortion now leverages embarrassing executive data.
Read the May Cyber Risk Monitor.