OSINT Academy

Overall data breach posture in 2022

1. Background

With the advent of the digital age, data security has become a common challenge across the globe. Despite the many security measures in place, data breach still occur from time to time, and in 2022, various data breach will continue to occur globally.

2. Data Breach Overview

A data breach is the process by which data is accessed, obtained or made public by an external or internal person or system without authorization or permission. Data breach are usually caused by security breaches, technical errors or human errors.

3. Overall Data Breach Situation

There were 4,145 publicly disclosed data breach worldwide in 2022; the average global loss from a data breach has reached $4.35 million; and nearly 68 records are compromised every second.

According to verizon's 2022 report, 36 percent of data breach involved phishing, and other common data breach vectors included cloud configuration errors at 15 percent and third-party software vulnerabilities at 13 percent.

The industry that suffered the most data breach was healthcare, up 38 percent year-over-year. The financial sector was next, with the industrial services and legal sectors also seeing a gradual increase in the percentage of breach, with the legal sector among the top 10 data breach. Nonprofit, education, insurance and construction have declined, and the insurance industry has seen far fewer breach than other industries, accounting for only 2% of cases.

The change in data breach suffered by each industry in 2022 compared to 2021 is shown in the chart below.

data breach2022

Information of many car companies was publicly sold on the dark web
The 12 Most Frequently Exploited Vulnerabilities in 2022 (4)
How to use open source intelligence for attack surface analysis?
The 12 Most Frequently Exploited Vulnerabilities in 2022 (3)
The 12 Most Frequently Exploited Vulnerabilities in 2022 (2)
What is OPSEC originating from the U.S. military?
How to use threat intelligence to monitor criminal activity on the dark web? (2)