Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Compromised Devices Lead Attacks on SMBs

April 17, 2025
Reading Time: 2 mins read
in News
Less Malware and Higher Wire Fraud in 2024

In 2024, network edge devices were identified as the primary entry point in 30% of cybersecurity incidents targeting small and medium-sized businesses (SMBs). These devices, including VPN appliances, firewalls, and remote access tools, were the most frequent cause of initial network compromises. VPN devices alone accounted for 19% of these intrusions. Since these devices often lack advanced security tools like endpoint detection and response (EDR), they are increasingly targeted by cybercriminals seeking unauthorized access.

A troubling trend emerged in which attackers exploited vulnerabilities in these network edge devices. Many of these devices had outdated patches or were no longer supported by their vendors. The attackers relentlessly targeted these devices, especially since they often serve as gateways to larger, more sensitive networks. Experts noted that businesses must regularly update and manage these devices to avoid becoming prime targets for threat actors, such as ransomware groups.

Another disturbing finding from the 2024 report was the rise of remote ransomware attacks. These attacks, which bypass traditional malware detection systems, grew by 50% compared to 2023 and 141% since 2022. Cybercriminals conducted these attacks from unmanaged devices outside the range of endpoint protection software. By exploiting network file-sharing connections, they encrypted files without executing ransomware directly on the victim’s device, thereby evading detection measures.

Social engineering techniques have also evolved, with attackers leveraging new tools to enhance their efficiency. Sophos researchers observed a rise in Microsoft Teams vishing attacks and sophisticated MFA phishing strategies. Additionally, cybercriminals increasingly used generative AI to create fake profiles, images, and videos for social engineering. QR codes, or “quishing,” emerged as another tool to help attackers bypass traditional security defenses and deliver malicious payloads to unsuspecting victims.

Reference:

  • Compromised Network Devices Account for Majority of Cyberattacks on SMBs in 2024
Tags: April 2025Cyber NewsCyber News 2025Cyber threats
ADVERTISEMENT

Related Posts

Arsen Launches AI Vishing Sim for Large-Scale Voice Phishing

Danish Agency Ditches Microsoft for Digital Independence

June 16, 2025
Arsen Launches AI Vishing Sim for Large-Scale Voice Phishing

Arsen Launches AI Vishing Sim for Large-Scale Voice Phishing

June 16, 2025
Arsen Launches AI Vishing Sim for Large-Scale Voice Phishing

Kali Linux 2025.2 Released with New Tools

June 16, 2025
Securonix Buys ThreatQuotient For AI SecOps

WhatsApp Backs Apple In UK Encryption Case

June 13, 2025
Securonix Buys ThreatQuotient For AI SecOps

New NIST Guide Helps Implement Zero Trust

June 13, 2025
Securonix Buys ThreatQuotient For AI SecOps

Securonix Buys ThreatQuotient For AI SecOps

June 13, 2025

Latest Alerts

PyPI Malware Steals AWS, CI/CD, macOS Data

IBM Backup Service Flaw Allows Elevated Access

Image Hiding in DNS TXT Records

Old Discord Links Now Lead To Malware

VexTrio TDS Uses Adtech To Spread Malware

Simple Typo Breaks AI Safety Via TokenBreak

Subscribe to our newsletter

    Latest Incidents

    Canada WestJet Airline Contains Cyberattack

    Hackers Leak 10K VirtualMacOSX Customer Data

    Washington Post Investigates Cyberattack on Emails

    Cyberattack On Brussels Parliament Continues

    Swedish Broadcaster SVT Hit By DDoS

    Major Google Cloud Outage Disrupts Web

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial