For the table, I followed the classifications/categories used by the reports.
Fwiw, if the exploit steals config details/usernames/passwords, then enabling MFA or not exposing the admin panel could still prevent the attack. So in a sense, configuration would still matter. It is murky tho.
18.02.2025 08:53 โ ๐ 2 ๐ 0 ๐ฌ 0 ๐ 0
- The median estimate of stolen credentials was 29% and phishing 17%.
- Vulnerabilities represented a lower share of initial access vectors in samples comprising smaller firms.
- Exposed vulnerabilities/End of Life software represent a minority of notifications sent by Coalition.
18.02.2025 08:43 โ ๐ 1 ๐ 0 ๐ฌ 1 ๐ 0
We looked at two main data sources: the causes of cyber incidents via DFIR investigations, and the presence of security issues found via scans. We found:
- Exploits of vulnerabilities were the initial access vectors in <50% of incidents across 7 studies, with 32% being the median estimate
18.02.2025 08:43 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0
This project asks whether addressing software vulnerabilities or misconfiguration should be higher priority when pursuing Secure by Design.
Here, vulnerabilities are flaws introduced by the vendor, in contrast to configuration which is controlled by the end-user.
18.02.2025 08:43 โ ๐ 4 ๐ 1 ๐ฌ 1 ๐ 1
WEIS 2025 โ The 24th Workshop on the Economics of Information Security (Tokyo, Japan)
Workshop on the Economics of Information Security (WEIS'25) venue and dates just announced.
Date: June 23-25, 2025
Venue: Institute of Industrial Science (IIS), The University of Tokyo
kmlabcw.iis.u-tokyo.ac.jp/weis/2025/in...
03.12.2024 13:26 โ ๐ 1 ๐ 1 ๐ฌ 0 ๐ 0
Definitely a blind men and an elephant problem
03.12.2024 09:20 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
Interesting slides tho. Will there be a recording?
03.12.2024 09:18 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0
humble title ๐
03.12.2024 09:13 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0
One attack could hit three if the attacker phished credentials and used them to login via RDP
03.12.2024 09:05 โ ๐ 1 ๐ 0 ๐ฌ 1 ๐ 0
Ah it could be. I'll double check. It's why I like sharing figures before publication
03.12.2024 09:04 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
Initial access vectors according to various DFIR firms.
Random thoughts:
- None of the reports find the majority are caused by vulns/exploits
- How do some of these firms *not* have an "unknown" category
- Many categories are overlapping
- We really need a standardized schema @zakird.com
03.12.2024 08:56 โ ๐ 7 ๐ 2 ๐ฌ 3 ๐ 0
Security Economics
Join the conversation
I've started building a starter pack for security economics researchers. It's a work in progress, so feedback and suggestions are more than welcome! We'll continue to update itโstay tuned!
go.bsky.app/BgGNPep
26.11.2024 14:13 โ ๐ 9 ๐ 2 ๐ฌ 1 ๐ 0
Strong agree! The threat against consumers is often unrelated to a security breach, typically rooted in defamation, often groundless.
26.11.2024 10:41 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
Ofc! You're the most curious person in cyber risk
25.11.2024 15:34 โ ๐ 1 ๐ 0 ๐ฌ 1 ๐ 0
fun fact from SEC Chairman Gary Gensler's resignation announcement
18% of tips/complaints that come to the SEC relate to crypto, even though the crypto market is less than 1% of all financial markets
www.sec.gov/newsroom/pre...
22.11.2024 16:49 โ ๐ 577 ๐ 192 ๐ฌ 9 ๐ 10
Just 1.6% of respondents have cyber coverage, and 8.5% are aware of the product.
It'll be interesting to see how this product evolves.
I think these losses will be absorbed into home insurance policies as a premium option. It's hard to justify a separate sales channel for a <$50 product.
25.11.2024 10:05 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
Notably, insurers see non-trivial costs associated with cyberbullying.
The typical claim may involve legal costs, counselling and lost wages to respond to the incident.
But in extreme cases, cyber insurance will cover costs associated with moving home or school.
25.11.2024 10:02 โ ๐ 1 ๐ 0 ๐ฌ 1 ๐ 0
We also asked participants to estimate how much compensation they would need to cover each cyber incident.
Financial frauds were estimated to be the most expensive, with no statistically significant difference between victims and nn-victims.
The median cost of cyberbullying was estimated to be $0.
25.11.2024 09:59 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0
Cyber attack and online fraud are possibly too generic.
There was multiple examples where participants thought they were "very easy" to define, only to find the real definitions from a policy are "not at all similar" when presented with one.
These discrepancies can lead to nasty surprises.
25.11.2024 09:57 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0
The second stage designed a survey to explore coverage, risk and product uncertainty.
Some of these coverages are well understood by both high and low security awareness participants, such as cyberbullying and ID theft.
Cyber extortion was perceived to be the hardest to define.
25.11.2024 09:55 โ ๐ 1 ๐ 0 ๐ฌ 1 ๐ 0
Figure showing cyber insurance covers a range of harms covering security, privacy, scams and online abuse.
What does personal cyber insurance cover?
Our new article found that personal cyber insurance covers a range of online harms, including social media abuse.
"Why would money protect me from cyber bullying?": A Mixed-Methods Study of Personal Cyber Insurance
www.computer.org/csdl/proceed...
25.11.2024 09:53 โ ๐ 6 ๐ 2 ๐ฌ 1 ๐ 1
My favourite finding is that these teams function like labour unions in negotiating with large tech companies to receive fair bug bounty payouts. This fighting for the little guy was very Ross.
We scraped a bunch of descriptive stats on team size, finding that the biggest teams have 500+ members.
22.11.2024 15:13 โ ๐ 1 ๐ 0 ๐ฌ 1 ๐ 0
CSDL | IEEE Computer Society
Very proud of Lawrence (Yangheran) Piao who had his first article accepted at Oakland'25.
The paper looks at the role of hacker teams in the Chinese bug bounty ecosystem.
We very sadly lost Ross Anderson mid way through this project.
www.computer.org/csdl/proceed...
22.11.2024 15:12 โ ๐ 6 ๐ 2 ๐ฌ 1 ๐ 0
She'd already reported to Google but hadn't heard back.
21.11.2024 11:02 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
I recommended this to a colleague who was being impersonated via a gmail account just last week.
21.11.2024 11:02 โ ๐ 1 ๐ 0 ๐ฌ 1 ๐ 0
Assistant Professor Cybersecurity and Privacy, School of Informatics, University of Edinburgh
Straight-shooting information and analysis at the intersection of national security, law, and policy.
Support Lawfare at https://www.lawfaremedia.org/support
Postdoc at the University of Birmingham - Research interests: Behavioural and Experimental economics & Health economics
More about me at: https://sites.google.com/site/hamidehmohtashamiborzadaran
Official account of the Workshop on Attackers and Cybercrime Operations. www.wacco-workshop.org
Associate Professor, Privacy, Security, Software Engineering at UMaine
https://www.sepidehghanavati.com
mitmproxy developer, making cloud more secure at Google. TLS, web, networks, and open source.
Mostly active on http://fedi.hi.ls these days, mirroring announcements here.
Faculty member at LSU. Research interests in web security.
https://www.phanivadrevu.com/
Wilfried Guth Professor of Constitutional Political Economy and Competition Policy @uni-freiburg.de. Mostly working on institutions, migration and/or conflict.
Homepage: https://sites.google.com/view/timkrieger/home
UK-based retired software developer.
Art, Photography, Science, Music, Economics, Politics, Geology, Physics, Chemistry, Earth Science, Architecture, Archaeology
I can't send/receive DMs here.
Signal: alan.285
Blog @ www.InnoVirtuoso.com | InfoSec, Cyber, AI Enthusiast | I write about Tech and News, AI, BCI, and other IT stuff.
Contact me at ๐ง info@innovirtuoso.com
Mathematical Research ( Geometric Topology, Differential Geometry), Large Language Models, Natural Language Processing, Quantum Computing, Cryptography, LORD KRISHNA IS GOD OF MATH
Researcher โ of Internet, Security Economics, Platforms, and Tech Policy. Opinions mine.
MECS Ph.D. student @KelloggSchool
AI + Behavioral & Experimental Economics
https://www.david-almog.com/
Security Researcher, DFIR, Intel, and cats.
I respect all human life, regardless of class, caste, creed, color, race, gender, religion, or nationality. I believe in humanity above all.
macro-economist & director @wiiw.ac.at, historian @dshcs.bsky.social, visiting professor @collegeofeurope.bsky.social, policy, econometrics, EU, Central, East & Southeast Europe
Senior Fellow at European Council on Foreign Relations. #Drone politics PhD @ox.ac.uk. Previously at, and now teaching @SciencesPo.bsky.social. Writes about all things #Germany #Defence #miltech. Podcast host at @SicherheitsPod.de & LeCollimateur