Human Risk as Primary Driver of Cyber Breaches
Summary
Hide β²
Show βΌ
Human risk has been identified as the primary driver of cyber breaches globally. Over 60% of breaches in 2024 involved a human element, highlighting the need for a robust security culture within organizations. Effective mitigation of human risk requires a strong organizational security culture that supports secure behavior, rather than relying solely on technology and policy enforcement.
Timeline
-
19.08.2025 14:15 π° 1 articles Β· β± 28d ago
Human Risk Identified as Primary Driver of Cyber Breaches in 2024
The 2024 Data Breach Investigations Report reveals that nearly 60% of breaches involved a human element. This highlights the critical need for organizations to prioritize security culture to mitigate human risk. Effective security culture involves leadership signals, security team engagement, policy design, and security training.
Show sources
- Why Your Security Culture is Critical to Mitigating Cyber Risk β thehackernews.com β 19.08.2025 14:15
Information Snippets
-
Human risk represents the greatest driver of breaches globally, with nearly 60% of breaches in 2024 involving a human element.
First reported: 19.08.2025 14:15π° 1 source, 1 articleShow sources
- Why Your Security Culture is Critical to Mitigating Cyber Risk β thehackernews.com β 19.08.2025 14:15
-
Attackers increasingly exploit human behavior rather than infrastructure vulnerabilities.
First reported: 19.08.2025 14:15π° 1 source, 1 articleShow sources
- Why Your Security Culture is Critical to Mitigating Cyber Risk β thehackernews.com β 19.08.2025 14:15
-
Security culture is defined by shared perceptions, beliefs, and attitudes about cybersecurity across an organization.
First reported: 19.08.2025 14:15π° 1 source, 1 articleShow sources
- Why Your Security Culture is Critical to Mitigating Cyber Risk β thehackernews.com β 19.08.2025 14:15
-
Effective security culture requires leadership signals, security team engagement, policy design, and security training.
First reported: 19.08.2025 14:15π° 1 source, 1 articleShow sources
- Why Your Security Culture is Critical to Mitigating Cyber Risk β thehackernews.com β 19.08.2025 14:15
-
Security policies should be simple and intuitive to reinforce the idea that security is achievable.
First reported: 19.08.2025 14:15π° 1 source, 1 articleShow sources
- Why Your Security Culture is Critical to Mitigating Cyber Risk β thehackernews.com β 19.08.2025 14:15
Similar Happenings
Chinese State-Sponsored Actors Targeting Global Critical Infrastructure
Chinese state-sponsored Advanced Persistent Threat (APT) actors, specifically the Salt Typhoon group, are conducting a sustained campaign to gain long-term access to critical infrastructure networks worldwide. These actors exploit vulnerabilities in routers and other edge network devices used by telecommunications providers, ISPs, and other infrastructure operators. The campaign targets telecommunications, transportation, lodging, government, and military networks. The actors employ tactics to evade detection and maintain persistent access, posing a significant threat to national and economic security. The advisory provides actionable guidance to help organizations strengthen their defenses and protect critical systems. The campaign has targeted at least 600 organizations across 80 countries, including 200 in the U.S. The advisory details how state-backed threat actors, including Salt Typhoon, penetrate networks around the world and how defenders can protect their own environments. The advisory tracks this cluster of activity to multiple advanced persistent threats (APTs), though it partially overlaps with Salt Typhoon. The advisory notes that the actors have had considerable success exploiting publicly known vulnerabilities, including Ivanti Connect Secure, Ivanti Policy Secure, Palo Alto Networks PAN-OS, and Cisco IOS XE vulnerabilities. The advisory suspects that the APT actors may target other devices, including Fortinet firewalls, Juniper firewalls, Microsoft Exchange, Nokia routers and switches, Sierra Wireless devices, and Sonicwall firewalls. The actors use multiple tactics to maintain persistence, including modifying Access Control Lists (ACLs), opening standard and non-standard ports, enabling SSH servers, and creating tunnels over protocols. The actors target protocols and infrastructure involved in authentication, such as Terminal Access Controller Access Control System Plus (TACACS+), to facilitate lateral movement across network devices. The advisory provides extensive recommendations for mitigating these threats, including monitoring network device configuration changes, auditing network services and tunnels, and checking logs for integrity. The advisory highlights a critical shift from Chinese state-sponsored activity from being purely espionage to gaining long-term access for potential disruption. 45 previously unreported domains associated with Salt Typhoon and UNC4841 have been discovered, dating back to May 2020. The oldest domain identified is onlineeylity[.]com, registered on May 19, 2020. The domains were registered using Proton Mail email addresses and fake personas. The domains point to high-density and low-density IP addresses, with the earliest activity traced back to October 2021. The domains are linked to Chinese cyber espionage campaigns, with potential overlaps between Salt Typhoon and UNC4841.
CISA and partners respond to cyber attack on Nevada state services
On August 24, 2025, a ransomware attack targeted the state of Nevada, impacting essential services and leading to data theft. The Cybersecurity and Infrastructure Security Agency (CISA) and its partners are providing real-time incident response to assist in restoring critical services and rebuilding systems. The attack's origins are under investigation. CISA's Threat Hunting teams are actively examining state networks to identify the full scope of the situation and mitigate threats. The Federal Bureau of Investigation (FBI) is assisting in the investigation, and the Federal Emergency Management Agency (FEMA) is advising on emergency response grants and other available assistance. The attack on Nevada is part of a broader trend of ransomware attacks on local governments, exacerbated by federal budget and staffing cuts.