Tenable research says over 40 billion records were vulnerable in 2021

News Desk -

Share

According to Tenable, the Cyber Exposure firm, at least 40,417,167,937* records were exposed globally in 2021, as determined by Tenable’s Security Response Team’s study of 1,825 publicly announced breach data incidents between November 2020 and October 2021. This is up from 730 publicly announced occurrences with just over 22 billion data exposed over the same time period in 2020. This research is outlined in Tenable’s 2021 Threat Landscape Retrospective (TLR) report, which contains a summary of the attack path and vulnerabilities that threat actors prefer, as well as insights that will help enterprises prepare for the challenges ahead in 2022.

Ins 1 - Tenable - Tenable research - Breach data - Data exposed - Threat Landscape Retrospective - TLR - Attack path - Vulnerabilities - 2021 - Techxmedia

Organizations can efficiently prioritise security operations to disrupt attack vectors and protect important systems and assets by studying threat actor behaviour. Many of the events investigated for this research can be easily mitigated by patching legacy vulnerabilities and fixing misconfigurations, which can help limit attack routes.

  • Ransomware had a monumental impact on organizations in 2021, responsible for approximately 38% of all breaches. 
  • 6% of breaches were the result of unsecured cloud databases. 
  • Unpatched SSL VPNs continue to provide an ideal entry point for attackers to perform cyberespionage, exfiltrate sensitive and proprietary information as well as encrypt networks.
  • Threat groups, particularly ransomware, have increasingly exploited vulnerabilities and misconfigurations in Active Directory.
  • Software libraries and network stacks used commonly amongst OT devices often introduce additional risk when security controls and code audits are not in place.
  • Ransomware groups favored physical supply chain disruption as a tactic to extort payment while cyberespionage campaigns exploited the software supply chain to access sensitive data.
  • Healthcare and education experienced the greatest disruption from data breaches.

“Migration to cloud platforms, reliance on managed service providers, software and infrastructure as a service have all changed how organizations must think about and secure the perimeter,” explains Claire Tills, Senior Research Engineer, Tenable. 

She added,“Modern security leaders and practitioners must think more holistically about the attack paths that exist within their networks and how they can efficiently disrupt them. By examining threat actor behavior we can understand which attack paths are the most fruitful and leverage these insights to define an effective security strategy. ”

Ins 2 - Tenable - Tenable research - Breach data - Data exposed - Threat Landscape Retrospective - TLR - Attack path - Vulnerabilities - 2021 - Techxmedia

Patching assets is difficult enough given the sheer frequency of vulnerabilities revealed, but in 2021 it became much more harder due to partial patches, vendor miscommunications, and patch bypasses. There were 21,957 common vulnerabilities and exposures (CVEs) reported in 2021, up 19.6% from 18,358 in 2020 and 241% more than the 6,447 declared in 2016. The number of CVEs increased at an average yearly percentage growth rate of 28.3 percent from 2016 to 2021.

Ins 3 - Tenable - Tenable research - Breach data - Data exposed - Threat Landscape Retrospective - TLR - Attack path - Vulnerabilities - 2021 - Techxmedia

Tenable’s Security Response Team monitors and reports on vulnerabilities and security incidents throughout the year, advising security professionals on how to plan their response methods. The team’s work allows them to keep a close eye on the threat’s ever-changing dynamics.