2023: A Selection of Cybersecurity Threat Reports

https://cdn-images-1.medium.com/max/800/1*BeOkCznhzNnfooQe4K8TBw.jpeg
Photo by Ales Nesetril on Unsplash

Trends: Every year there are shifts in the cyber threat landscape, changes in attack techniques, and the number of breaches. And each year vendors, security organisations, research institutes and government agencies publish relevant reports on the current cybersecurity threat landscape. As the number of various published reports can be daunting, I’ve tried (like in 2022) to create an overview of a selection of what has been published so far in 2023 — and, more importantly, where to get them. The selection is shown in alphabetical order based on the publishing organisation.

💡 This blog will be updated throughout the year with newly released reports and insights. Do you have any additions? Feel free to add them in the comments below!

💡 Also, for tips on how to read the reports more efficiently, click here (or scroll down to the end of the article).

2023 Threat reports

💡 Current number of threat reports: 71

Arctic Wolf Labs

Adaptive Shield

AIVD (Algemene Inlichtingen en Veiligheidsdienst, the Netherlands)

BlackBerry

Check Point

CyberSecurity & Infrastructure Security Agency (CISA)

CrowdStrike

CSW (Cyber Security Works, together with Securin, Ivanti & Cyware)

DirectDefense

Dragos

Egress

ENISA

ESET (/WeLiveSecurity)

Estonian Foreign Intelligence Service

Federal Bureau of Investigation (FBI, USA)

Fortinet

HYAS

IBM

IRONSCALES

Intel471

IronNet

KPMG

Mandiant

MITRE Engenuity

MIVD (Militaire Inlichtingen en Veiligheidsdienst, the Netherlands)

Momentum

National Security Archive (United States)

NCC Group

Office of the Director of National Intelligence (USA)

Orca Security

Palo Alto Unit 42

Picus

Proofpoint

Recorded Future

Red Alert (part of NSHC group)

Red Canary

RiskLens

Security Intelligence

SonicWall

The State Cyber Protection Centre State Service of Special Communications and Information Protection of Ukraine (SCPC)

The State Service of Special Communications and Information Protection of Ukraine (CIP)

Team Cymru

Tesseract Intelligence

The DFIR Report

Trellix

VirusTotal

VulnCheck

Z-CERT

Tips for reading the reports efficiently

First and foremost, remember that none of the reports should be seen as a single source of truth — as much as some publishers might want you to. In some cases, data might be complementary or contradictory, depending on the scope of the data collected (e.g. due to differences in client base, research participants, or the way technical data is collected). Because of this, always keep a critical mind while reading.

Secondly, be aware of the period over which the publishing organisation is reporting. E.g. a “2022” report could be released in 2023. If you intend to create a personal knowledgebase with reports or whitepapers from multiple years, this is an important distinction to keep in mind.

Thirdly, focus on the parts of the reports that are relevant to your (client) organisation. This could for example be parts that focus on

  • your industry,
  • geographical location, or
  • cloud infrastructure that your (client) organisation leverages

And lastly, keep in mind why you’re reading the report — a SOC Analyst requires different information from a threat report to fulfil their job than their CISO, and will thus always look at the data with a different view.

💡 Opinions expressed in my blogs are solely my own and do not express the views or opinions of my employer or clients

--

--

Woman (she/her/hers) in CyberSecurity that believes she contributes with her actions in the cyber security world to the greater good.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Jennifer Wennekers

Woman (she/her/hers) in CyberSecurity that believes she contributes with her actions in the cyber security world to the greater good.