September 10, 2015 By Shane Schick 2 min read

There’s no more personal form of cybercrime than identity theft, and a report covering the top breaches of the year so far suggested it represents the most common form of cyberattack.

Findings from security firm Gemalto’s Breach Level Index were compiled in its “2015 First Half Review.” The report showed that close to 900 incidents took place over the last six months, an increase of 10 percent over the same period last year. Overall, some 246 million records have been compromised. The top breaches affected organizations in health care, government and insurance, among other sectors.

As Dark Reading pointed out, 62 percent of those responsible for the top breaches were not necessarily insiders or former employees, but outside third parties. State-sponsored attackers also represented a small but significant component of those committing identity theft and other forms of cybcercriminal activity. The article suggested higher levels of encryption may be one of the only ways to make data less valuable and therefore fend off the worst of the potential threats.

One of the surprises in the Gemalto report is that the top breaches between January and July saw a decline of the actual number of compromised records of about 41 percent. CSO Online suggested that’s no reason to celebrate, however, since it may merely indicate that we haven’t seen an attack that matches the scale of those experienced over the course of 2014.

Although Infosecurity Magazine reported that the U.S. was the victim in the lion’s share of the top breaches. However, the forthcoming introduction of new disclosure laws in the European Union could provide more accurate information on the extent to which its organizations are affected by cybercriminals. That’s assuming they are even able to detect when an incident takes place — the Gemalto report indicated many are oblivious to an attack until it’s already too late.

There is little doubt that most, if not all, of the top breaches were financially motivated, and unfortunately those who attempt to steal records are seeing a massive return on their investment, according to Banking Technology. In other words, large troves of customer contact information, passwords and other details are being netted in various incidents. Unless CISOs take action, we’re likely to see even worse statistics in the next version of this report.

More from

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today