Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
Urgent mitigation urged for on-premises users of an endpoint security ...
VIVOTEK’s VORTEX Cloud Solution Enhances Efficiency and Security...
Do corporations know the various AI risks that come with insufficient ...
When legitimate URLs lead to dangerous destinations
Uzum Secures $70M Equity Financing Led by Tencent and VR Capital, Reac...
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      When legitimate URLs lead to dangerous destinations

      When legitimate URLs lead to dangerous destinations

      Wednesday, August 6, 2025, 11:04 AM Asia/Singapore | Features
    • Featured

      Securing trust in a digitally ambitious Singapore

      Securing trust in a digitally ambitious Singapore

      Tuesday, August 5, 2025, 10:19 AM Asia/Singapore | Features, Newsletter
    • Featured

      Is your organization truly AI-ready?

      Is your organization truly AI-ready?

      Wednesday, July 30, 2025, 8:55 PM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning

Select Page

LOGIN REGISTER
  • Features
    • Featured

      When legitimate URLs lead to dangerous destinations

      When legitimate URLs lead to dangerous destinations

      Wednesday, August 6, 2025, 11:04 AM Asia/Singapore | Features
    • Featured

      Securing trust in a digitally ambitious Singapore

      Securing trust in a digitally ambitious Singapore

      Tuesday, August 5, 2025, 10:19 AM Asia/Singapore | Features, Newsletter
    • Featured

      Is your organization truly AI-ready?

      Is your organization truly AI-ready?

      Wednesday, July 30, 2025, 8:55 PM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning
News

Were cyberattackers evading detection less efficiently in 2023?

By CybersecAsia editors | Friday, April 26, 2024, 1:42 PM Asia/Singapore

Were cyberattackers evading detection less efficiently in 2023?

According to one cybersecurity firm’s incident metrics, the mean dwell time was the lowest ever recorded by its teams globally

In analyzing 2023 metrics of targeted and remediated attack activity investigated by its teams, a cybersecurity firm has released some key takeaways  from the data.

First, the global “median dwell time” (the time attackers remain undetected within a target environment) was 10 days, down from 16 in 2022. This is the lowest point recorded in similar yearly metrics recorded by the firm in over a decade. Its customers in the Asia Pacific and Japan region had experienced the highest reduction in median dwell time: from 33 days in 2022 metrics to nine days in 2023. The firm surmises that this variation could have been driven by “the quick moving ransomware used in the incidents in the region, as ransomware-related intrusions consumed the highest majority for the investigation type compared to any other region in 2023.”

Second, the top targeted customers were, by industry, in the financial services (17%), business and professional services (13%), high technology (12%), retail and hospitality (9%), and healthcare (8%). The theory is that these industries possessed a wealth of marketable sensitive information.

Third, 626 new malware families were tracked in 2023, the highest number of net new malware families identified in the firm’s customer base in a single year to date. Among these, the top five categories included backdoors (33%), downloaders (16%), droppers (15%), credential stealers (7%) and ransomware (5%).

Finally, attackers in the data were noted to have been  increasingly targeting edge devices, leveraging “living off the land” techniques and exploiting zero-day vulnerabilities.

According to Jurgen Kutscher, Vice President, Mandiant Consulting, the firm that supplied its yearly findings, organizations in its user base had “done a better job in 2023 at protecting systems and detecting compromises” but “organizations must remain vigilant. A key theme is that attackers are taking steps to evade detection and remain on systems for longer, and one of the ways they accomplish this is through the use of zero-day vulnerabilities. This further highlights the importance of an effective threat hunt program, as well as the need for comprehensive investigations and remediation in the event of a breach.”

Share:

PreviousAI adoption in India: A balancing act worth chatting about
NextSecuring Industry 4.0

Related Posts

Four cyber threats expected to get even more worrisome next year

Four cyber threats expected to get even more worrisome next year

Wednesday, November 29, 2023

Upcoming report on crypto crime examines its impact by sanctioned nations

Upcoming report on crypto crime examines its impact by sanctioned nations

Tuesday, February 25, 2025

Check Point Research reveals Android security flaw

Check Point Research reveals Android security flaw

Thursday, September 5, 2019

Know the dangers of downloading modified versions of well-known mobile apps

Know the dangers of downloading modified versions of well-known mobile apps

Wednesday, July 5, 2023

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper
  • Mitigating Ransomware Risks with GRC Automation

    Mitigating Ransomware Risks with GRC Automation

    In today’s landscape, ransomware attacks pose significant threats to organizations of all sizes, with increasing …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • PT Kereta Api Indonesia announces nationwide email and communication overhaul

    PT Kereta Api Indonesia announces nationwide email and communication overhaul

    The state railway operator’s upgraded email system improves privacy, operational reliability, and regulatory alignment for …Read more
  • Operationalizing sustainability in cybersecurity: Group-IB’s approach

    Operationalizing sustainability in cybersecurity: Group-IB’s approach

    See how the firm turned malware-group takedowns into measurements of sustainability and resilience gains: by …Read more
  • Thai government expands secure email management to close cybersecurity gaps

    Thai government expands secure email management to close cybersecurity gaps

    New measures address cybersecurity gaps in public sector communications, deploying advanced protections and operational support …Read more
  • How Iress optimized global DevSecOps

    How Iress optimized global DevSecOps

    Scaling compliance, security & efficiency – while seamlessly migrating to the cloud – with JFrog.Read more

Bottom sidebar

  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2025 CybersecAsia All Rights Reserved.