WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Report: Sophos Finds Many Breaches Still Caused by Lack of Patching
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Report: Sophos Finds Many Breaches Still Caused by Lack of Patching

Author: April Zupan

Created: Thursday, April 27, 2023 - 17:19

Categories: Cybersecurity

Not all trend analysis reports are created equal, but occasionally some stand out. Nonetheless, many such reports are often useful for lessons learned and an enlightening nugget or two. One such report is Sophos’ 2023 Active Adversary Report for Business Leaders, which provides a picture of how threat actors are operating. The report is derived from over 150 incident response engagements selected from its 2022 workload. Undoubtedly most key takeaways won’t be surprising, but some of the perspectives/observations are enlightening and confirming and are useful for understanding the threat landscape.

Sophos’s data reveals that exploited vulnerabilities continue to be the highest root cause of a cyber incident at 37 percent. Fifty-five percent of those incidents were related to the ProxyShell or Log4Shell vulnerabilities, demonstrating how easily avoided many incidents are as patches have been available for these vulnerabilities since 2021. The second most common root cause is compromised credentials at 30 percent, demonstrating an increased preference for attackers to just log in to target networks.

One of the major takeaways is that the amount of time attackers spend on the network has decreased, which has interesting implications. It could imply that network defender detection capabilities have improved in tracking attackers, or it could imply that attackers are becoming more efficient in exfiltrating data. Read more at Sophos.

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 1, 2026)

May 1, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Cyber Readiness Institute Joins WaterISAC as a Community Partner to Strengthen Cyber Readiness Across the Water Sector

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar