Trends from the Underground H1 2023 MSSP Edition

Discover the crucial insights that could safeguard your clients against the rising tide of cyber threats in the second half of 2023. Our report takes a deep dive into the activities of threat actors worldwide, shedding light on the escalating ransomware attacks and vulnerability exposures that continue to plague the digital landscape.

Download Now

This report provides a comprehensive review of threat actor activities worldwide in the first half of 2023. It highlights the alarming rise in ransomware attacks and vulnerability exposures, along with unexpected changes in compromised credit card trends. The dominance of Generative AI solutions in the cyber domain is explored, as both threat actors and defenders rush to integrate AI capabilities into their strategies for the ongoing cyber arms race.

Trends from the Underground H1 '23 MSSP

The key trends discussed in this report are:

A change in direction for credit card fraud

Initial access broker market movements

Ransomware attack trends including the ransomware groups dominating our headlines in 2023

Vulnerability exposure trends including the top 10 vulnerabilities of 2023

Dark web forums vs. encrypted messaging apps

Download the Report

It will be sent to your e-mail!

How can Cybersixgill’s products can help your business?

Contact our experts to discover which solutions are best for your company

Book a demo

Recommended resources

Cybersecurity in Focus: Manufacturing
Ebook

Cybersecurity in Focus: Manufacturing

Get ahead of cyber threats targeting the manufacturing sector with our latest ebook.

Read now
Harnessing Risk Intelligence to Achieve Enforceable Security and Compliance
Webinar

Harnessing Risk Intelligence to Achieve Enforceable Security and Compliance

Apply contextual risk-based threat intelligence to enhance data security, compliance, and regulatory adherence, minimizing cybersecurity threats and assessing business risk.

Watch now
Broken Chains: Understanding Third-Party Cyber Threats
Report

Broken Chains: Understanding Third-Party Cyber Threats

Discover the nature and impact of supply chain attacks, emphasizing proactive measures for risk mitigation and enhancing supply chain security and resilience.

Read now