Source |
Cyble |
Identifiant |
8648178 |
Date de publication |
2025-02-12 10:33:38 (vue: 2025-02-12 11:07:54) |
Titre |
New Zealand\\'s National Cyber Security Centre (NCSC) Reports Surge in Cyber Threats and Vulnerabilities |
Texte |
Overview
The 2023/24 Cyber Threat Report from New Zealand\'s National Cyber Security Centre (NCSC), led by Lisa Fong, Deputy Director-General for Cyber Security at the Government Communications Security Bureau (GCSB), sheds light on the country\'s rapidly changing cyber threat landscape. The report highlights an increase in cyber incidents targeting individuals, businesses, and critical national sectors, underlining the growing complexity of cyber threats.
For the year ending June 2024, the NCSC recorded a whopping total of 7,122 cybersecurity incidents, marking a new milestone since CERT NZ\'s integration into the NCSC. Of these incidents, 95% (6,799) were handled through the NCSC\'s general triage process. These incidents primarily affected small to medium businesses and individual users and resulted in a reported financial loss of $21.6 million. While these incidents did not require specialized technical interventions, they still had a substantial impact on those affected, particularly in terms of financial losses and reputational damage.
A smaller subset of incidents, 343 in total, was categorized as having national significance. These incidents were more complex and targeted critical infrastructure or large organizations. Among them, 110 were linked to state-sponsored actors, signaling a slight increase in cyber activities from such groups. Financially motivated cybercriminal activities were responsible for 65 of these high-impact incidents, emphasizing the persistent threat from financially driven attacks such as ransomware and data exfiltration.
2023/24 Cyber Threat Report: State-Sponsored Cyber Threats and Ransomware
|
Notes |
★★★
|
Envoyé |
Oui |
Condensat |
$21 $38 110 122 2023 2023/24 2024 300x150 343 799 accessibility account accounts actions activities actors adaptability additionally adopt advanced advancements adversary affect affected agency aitm alerts alike all also although among applications approval are artificial attack attackers attacks authentication availability available awareness barrier based been being better between blogs both breaches bureau business businesses bypass can capabilities caption= catastrophic categorized categorizes causing centre cert certain challenge changing channels classified collaborations collective com/wp common communications compared complex complexity compromise compromised compromises compromising concern concerning conclusion conducted conflict connectivity content/uploads/2025/02/cyble continues contrast corporate country coupled credential credentials criminal critical crucial cryptocurrency cyber cyberattacks cybercriminal cybercriminals cybersecurity damage data ddos deceive decline decrease defenses deliver denial deputy despite did difficult director disrupt disrupted disruptive distinguishing distributed diversifying documents/ncsc does driven easier effective efforts email emerging emphasizes emphasizing enabled enables encryption ending engineering entities equally especially espionage estimated events evolving exacerbated exfiltrated exfiltration expanding experts exploit exploited exploiting expose extort extortion face facing factor fall feasible file= final financial financially findings fong frameworks fraud frequency from further gathering gcsb general geopolitical global government govt groups grow growing hacktivists had handled harm has have having heavily helped high highlights highly https://cyble https://www human image impact impersonate incident incidents included including increase increasing increasingly individual individuals information infrastructure integration intelligence interventions involve involved issuing jpg june key landscape large launch lead leaks led leveraging light like linked lisa loss losses lowered made malicious malware manipulate many marking measures media medium methods mfa middle milestone million mitigate mitigated moderate more most motivated multi multiple national nations nature ncsc necessitate need new not notably noted notes now nz/assets/ncsc nz/news/cyber observed occur often once one ongoing online operate operations organizations other over overall overview particularly payments pdf persistent personal phishing platforms potential powerful practices prevalent prevent previous previously prey primarily pro proactive problematic process proliferation promoting psychology public raising ransomware rapidly reconnaissance recorded reduce references reliance rely remain remains report report: reported reports reputational require reserved resilience resistant resourced responsible resulted rise risk risks robust role routine russia russian saw scale scams scanning schools sector sectors security seen sensitive service services severe severity sharing sharp sheds signaling significance significant significantly since slight small smaller social solutions some sophisticated specialized sponsored state stay strengthening strongly subset substantial successful successfully such support surge swift systems tacit tactic tactics taking target targeted targeting technical techniques technological technologies technology tensions terms them these those threat threats through times title= tool tools total traditional trends triage trusted types ukraine underlining unsuspecting uptick urges urging use used users utilized victims vigilance vigilant volume vulnerabilities vulnerability warn well when which whopping widely widespread year years zealand zealanders |
Tags |
Ransomware
Tool
Vulnerability
Threat
Technical
|
Stories |
|
Move |
|