July 1st: Cyber Risk and Insurance Survey 2022 +++ YTStealers +++ Top 25 dangerous vulnerabilities

Munich Re Global Cyber Risk and Insurance Survey 2022

This year’s study by Munich Re shows that digitalisation in most areas of business and life continues unabated. All companies surveyed are focusing more strongly on new, smart technologies. The list of technological drivers is headed by 5G, cloud services, artificial intelligence, and data analytics. Highly IT-oriented countries like India and China, as well as South Africa and Brazil lead the list of nations that see the biggest potential in digitalisation.

In line with these developments, security vulnerabilities and cyber-attacks are also on the rise. On a global level, attacks such as online fraud, ransomware and data theft increased year-on-year as the data shows. Although awareness among surveyed managers, beyond incidents they themselves experienced, has risen by nearly 10% since our global survey in 2021, the reception of the threat landscape and what needs to be done to properly address it still varies greatly by country.

As a result, protection measures remain relatively low. For example, 83% of surveyed representatives said that their own company is not adequately protected against digital threats. This high number comes as a surprise in light of the fact that business models increasingly rely on digitalization and that awareness of associated threats is high.

Interested in knowing more?

YouTube content creators beware: YTStealer is after you!

A new information-stealing malware named YTStealer is targeting YouTube content creators and attempts to steal their authentication tokens to hijack their channels. Intezer published a report according to which the authors of YTStealer the capacity to make its token-stealing operation very effective, incorporating advanced, specialized tricks.

For more insights on YTStealers, we have listed three interesting sources for you:

Revealed: The TOP 25 Most Dangerous Vulnerabilities

The US Cybersecurity and Infrastructure Security Agency (CISA) and the nonprofit organization MITRE have published the 2022 list of the 25 most dangerous vulnerabilities. The 2022 CWE Top 25 Most Dangerous Software Weaknesses list contains the most common and impactful weaknesses and is based on the analysis of nearly 38,000 Common Vulnerabilities and Exposures (CVE) records from the previous two years. Out-of-bounds write and cross-site scripting (XSS) remain the two most dangerous vulnerabilities.

Do you want to know more about the most dangerous vulnerabilities? Then check out the whole findings below:

CWE – 2022 CWE Top 25 Most Dangerous Software Weaknesses (mitre.org)

Is cybersecurity a topic of interest for your company? As an independent entity with a portfolio of proven security providers, CyberCompare can provide you with comparative offers at no charge and with no obligation. Reach out to us or use our diagnostic to learn more about your cyber risk profile.

Please remember: this article is based our knowledge at the time it was written – but we learn more every day. Do you think important points are missing or do you see the topic from a different perspective? We would be happy to discuss current developments in greater detail with you and your company’s other experts and welcome your feedback and thoughts.

And one more thing: the fact that an article mentions (or does not mention) a provider does not represent a recommendation from CyberCompare. Recommendations always depend on the customer’s individual situation.

Simeon Mussler

We are happy to help you personally with the specification of your cybersecurity requirements:

+44 1895 838 918

Reach out now