Top 3 Threat Report Insights for Q2 2024

Photo of author

By Muhammad Hussain

Cato CTRL (Cyber Threats Research Lab) has released its Q2 2024 Cato CTRL SASE Threat Report. This report shares critical information after analyzing a huge amount of data — 1.38 trillion network flows from over 2,500 global customers between April and June 2024.

Here are the top three insights from the report that every business should know.

1) IntelBroker: A Major Cyber Threat

Cato CTRL discovered a dangerous hacker called IntelBroker. This hacker is well-known in dark web communities, especially in BreachForums, a popular hacking site. IntelBroker has been selling sensitive data and source code from big companies like AMD, Apple, Facebook, Microsoft, and even the US Army Aviation and Missile Command. This hacker is a serious threat to both companies and governments.

2) 66% of Brand Spoofing Targets Amazon

Cybersquatting happens when someone uses a fake version of a company’s website to trick users or steal their data. In Q2 2024, the report found that 66% of fake websites were pretending to be Amazon. This makes Amazon the most targeted company for brand spoofing. Google was second, but with only 7%, showing how much more hackers are focused on Amazon.

3) Log4j Vulnerability Still Being Used

Even though the Log4j vulnerability was first found in 2021, hackers are still using it to launch attacks. From Q1 to Q2 2024, Cato CTRL saw a 61% rise in Log4j exploit attempts in incoming traffic and a 79% increase in outgoing (WANbound) traffic. Another old vulnerability, Oracle WebLogic, also saw more attacks, with a 114% rise in exploit attempts during the same period.

Read also: Researchers Uncover Security Flaw in Windows Hello Fingerprint Authentication

Security Recommendations

Based on the findings, Cato CTRL suggests businesses take these steps to protect themselves:

  • Keep an eye on dark web forums for mentions of your company’s data or credentials.
  • Use tools to find and stop phishing attacks and cybersquatting.
  • Have a patching schedule to fix important vulnerabilities like Log4j.
  • Prepare a plan for responding to a data breach.
  • Adopt an “assume breach” approach using methods like Zero Trust Network Access (ZTNA) and Extended Detection and Response (XDR).
  • Develop an AI governance strategy to handle emerging tech risks.

Read also: What is OWASP Top 10 2024? A Brief Guide

Conclusion

The Cato CTRL Q2 2024 Threat Report highlights the ongoing dangers that businesses face, from sophisticated hackers like IntelBroker to widespread vulnerabilities like Log4j. It’s crucial for businesses to stay aware of these threats and take action to protect their networks.

If you want to stay ahead of cyber risks and learn more about protecting your business, check out Daily Digital Grind for tips, strategies, and updates on the latest in cybersecurity.