CRD #18
On incident response engagements, ransomware payments, incident root causes, security careers, hybrid work, software security & global threat trends.
The Cybersecurity Research Digest cuts through the marketing fluff and bias to bring you relevant and objective insights on cybersecurity stats and trends, all backed by empirical data.
The post features highlights from trustworthy research sources released between February 18 and March 3 followed by a list of all monitored reports.
IR engagements: ransom payments driven by speed of recovery, not system restoration
Surveys often suffer from biases that can distort findings, making real-world incident analysis valuable to understand cybersecurity realities. A recent report by Arctic Wolf based on hundreds of digital forensics and incident response (DFIR) engagements from October 2023 through September 2024 offers such insights into high-priority security incidents (i.e. those serious enough to warrant DFIR involvement).
The data shows that organizations most frequently seek DFIR assistance for ransomware cases (44%), followed by Business Email Compromise (BEC) (27%) and intrusions (24%). Notably, "intrusions" refer to threats detected before they escalate into ransomware or data extortion events.

These empirical findings confirm that as companies strengthen backup and restoration capabilities, double extortion has become the norm—96% of ransomware cases now involve data exfiltration to increase pressure on victims. The report also claims that professional negotiators can reduce ransom demands by 64%, though this is not compared to cases where organizations negotiate independently.
While only 30% of DFIR cases result in ransom payments (compared to 80% in broader survey data), a surprising observation is that companies now primarily pay to expedite recovery or prevent data leaks, rather than out of necessity to restore systems. The median aggregate demand has remained at the same level as previously, at $600,000.
Regarding root causes for ransomware, unsecured RDP and compromised VPN credentials remain the primary entry points for ransomware and data extortion cases. Interestingly, human risk factors seem to play a marginal role according to Arctic Wolf's experience, diverging from the dominant notion that social engineering and adjacent factors as main causes for breaches.
However, the second largest cause for IR cases gives a hint on this perceived difference in statistics: BEC cases — defined via account takeovers or simply impersonation tactics (e.g. via using similar domains) — phishing (72.9%) and previously compromised credentials (18.8%) dominate as root causes, underscoring the need for robust employee training, credential management, and stronger authentication measures, such as biometric- or possession-based MFA, to mitigate risks effectively.
Security careers: broad responsibilities, high earning potential, but retention concerns persist
A survey of 500+ U.S. security professionals shows that most (60%+) jobs require blending roles across different disciplines, including SecOps, risk management, GRC, AppSec, and/or product security. What is clear, however, is that most cybersecurity roles are built on technical experience in the IT domain, with over 70% of security engineers and more than half of analysts and architects credit their IT backgrounds as essential. Systems administration, network infrastructure, and general IT roles were the most cited foundational experiences, highlighting the strong technical prerequisites for cybersecurity careers.
Compensation varies significantly by role and region in the US, with security architects and engineers earning the highest average annual compensation at $206,000 and $191,000 (base + bonus), respectively, while mid-level security analysts with five years of experience earn around $133,000. Experts in the field reportedly often earn over twice as much as newcomers, underscoring the premium on deep expertise.

Job satisfaction remains relatively low, with over 60% considering a job change within a year. Career stagnation is the leading concern, particularly among senior professionals, especially functional department heads, emphasizing the need for clearer growth pathways.
Meanwhile, return-to-office policies are at odds with workforce preferences—52% of cybersecurity professionals reportedly work remotely, 43% follow hybrid models, and only 1% favor on-site roles. Mandating office returns in a talent-scarce field risks attrition and hampers recruitment.
Unavoidable realities: hybrid work, BYOD, and SaaS
Another survey of over 500 respondents from organizations with more than 2,500 employees across the United States, United Kingdom, Canada, France, and Germany confirms that while return-to-office mandates are increasing, hybrid work remains the norm. An estimated 42% of employees are expected to continue working remotely in some capacity, reinforcing the need for organizations to adapt to a permanently hybrid workforce reliant on devices such as laptops and smartphones.

Remote work has also entrenched the widespread use of personal devices—an ongoing challenge for security teams. Nearly all (98%) organizations report some level of BYOD policy violations, while 90% allow corporate data access from personal devices, amplifying related security risks.

Additionally, the study highlights the dominance of SaaS and cloud applications, with employees spending 80% of their workday on browser-based tools, underscoring the need for robust security measures around browser usage, particularly as behavior differs between managed and unmanaged devices.
Global threat trends: rising China activity, exploiting identities, vishing and other malware-free attacks
CrowdStrike's yearly report highlights a surge in threat activity across multiple fronts, with China-linked operations increasing by 150% across sectors and up to 300% in key targeted industries.
The report also emphasizes the growing underground market for initial access, with access broker advertisements rising 50% year-over-year, underscoring the need for organizations to address attack vectors linked to compromised identities. In cloud security, valid account abuse accounted for 35% of incidents, while 52% of exploited vulnerabilities overall were tied to initial access. The shift toward stealthier tactics continues, with 79% of attacks in 2024 being malware-free—a sharp rise from 40% in 2019.
Additionally, vishing attacks (social engineering via phone calls) surged by 442% in the latter half of the year, reflecting an increasing reliance on this technique. The report also highlights the accelerating pace of cyber operations, with the average breakout time dropping to 48 minutes. Furthermore, CrowdStrike tracked 26 new adversaries, bringing the total number of identified threat actors to 257, illustrating the evolving and expanding global threat landscape.
State of software security: progress on critical risks, but fix times and security debt worsen
A yearly study by Veracode, an application security testing provider, has tracked software security trends since 2011, offering a long-term perspective on progress and challenges. The findings highlight a significant improvement in addressing most relevant issues, with the pass rate for OWASP’s most critical risks more than doubling from 23% to 52.3%. However, albeit trending positively, the number still shows that a substantial portion of code—and this data is reflecting applications tested by organizations actively investing in security—still contains critical vulnerabilities.
While vulnerability reduction has improved, the study underscores a persistent challenge: the increasing time required to remediate security flaws, with the average time to fix vulnerabilities increasing nearly fivefold over the past 15 years. The growing complexity of modern software ecosystems—particularly the rising dependence on difficult-to-manage third-party code—is identified as a key driver of this trend, exacerbating security debt and delaying patching efforts. Notably, the study reports that half of organizations carry critical security debt, defined as unresolved high-severity vulnerabilities with high exploitability.
Reports monitored: 18 February - 3 March
To take a deeper dive in the topics most relevant for you, find below a list of all the monitored research reports (32) that were published during the observed period.
About
evisec's Cybersecurity Research Digest provides security leaders verified strategic insights via a carefully curated weekly summary of evidence-led, unbiased and objective cybersecurity research publications. Read more about our service here.
✉️ Suggestions or want to collaborate? Get in touch via LinkedIn or email (henry@evisec.xyz)