Report: Ripples Across the Attack Surface
Analyzing the top attack techniques used in multi-party cyber events
Sometimes small events can have far-reaching consequences, such as when one organization's security incident affects third parties and the broader supply chain. We call these effects "ripple events" and have been studying them for years.
Our latest study analyzes nearly 900 historical ripple events to identify the top MITRE ATT&CK techniques used. We seek to understand how these ripples occur and propagate, so your organization doesn’t get swept up in their wake.
In our new report, readers will learn about:
- attack techniques most commonly used in multi-party breaches
- the financial damage from ripple events
- top mitigation approaches post-compromise
Download the Report
Follow us for the latest insights