{"id":14214,"date":"2026-04-27T23:18:55","date_gmt":"2026-04-27T23:18:55","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=14214"},"modified":"2026-04-27T23:18:55","modified_gmt":"2026-04-27T23:18:55","slug":"what-you-see-just-isnt-all-theres","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=14214","title":{"rendered":"What you see just isn&#8217;t all there&#8217;s"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p class=\"sub-title\">A breach claims the techniques in addition to the arrogance that was, on reflection, a serious vulnerability<\/p>\n<div class=\"article-authors d-flex flex-wrap\">\n<div class=\"article-author d-flex\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/our-experts\/tomas-foltyn\/\" title=\"Tom\u00e1\u0161 Folt\u00fdn\"><picture><source srcset=\"https:\/\/web-assets.esetstatic.com\/tn\/-x45\/wls\/2017\/11\/photo-BW.jpg\" media=\"(max-width: 768px)\"\/><img decoding=\"async\" class=\"author-image me-3\" src=\"https:\/\/web-assets.esetstatic.com\/tn\/-x45\/wls\/2017\/11\/photo-BW.jpg\" alt=\"Tom\u00e1\u0161 Folt\u00fdn\"\/><\/picture><\/a><\/div>\n<\/div>\n<p class=\"article-info mb-5\">\n        <span>24 Apr 2026<\/span><br \/>\n        <span class=\"d-none d-lg-inline\">\u00a0\u2022\u00a0<\/span><br \/>\n        <span class=\"d-inline d-lg-none\">, <\/span><br \/>\n        <span>5 min. learn<\/span>\n    <\/p>\n<div class=\"hero-image-container\">\n        <picture><source srcset=\"https:\/\/web-assets.esetstatic.com\/tn\/-x266\/wls\/2026\/04-26\/raas-ransomware-ecosystem.png\" media=\"(max-width: 768px)\"\/><source srcset=\"https:\/\/web-assets.esetstatic.com\/tn\/-x425\/wls\/2026\/04-26\/raas-ransomware-ecosystem.png\" media=\"(max-width: 1120px)\"\/><img decoding=\"async\" class=\"hero-image\" src=\"https:\/\/web-assets.esetstatic.com\/tn\/-x700\/wls\/2026\/04-26\/raas-ransomware-ecosystem.png\" alt=\"The calm before the ransom: What you see is not all there is\"\/><\/picture>    <\/div>\n<\/div>\n<div>\n<p>There\u2019s a little bit of a sample within the historical past of organizational failures that repeats too usually to be a coincidence: A system runs easily for an extended stretch, inflicting everybody to develop assured in it. Nearly invariably, this additionally quietly erodes the vigilance that saved the system operating easily within the first place. After which the system fails \u2013 on the exact second when everybody concerned would have instructed you it was in glorious form.<\/p>\n<p>Counterintuitive as it could sound, stability itself will be destabilizing. It breeds complacency, which then reduces investments in preparedness and widens the hole between precise and perceived danger. Writer Morgan Housel compressed this sample into six phrases: \u201ccalm crops the seeds of loopy.\u201d This performs out somewhat visibly and with near-clinical regularity in <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/en.wikipedia.org\/wiki\/Minsky_moment\" target=\"_blank\" rel=\"noopener\">monetary markets<\/a>, however because it\u2019s woven into the warp and woof of human psychology, cybersecurity is not at all spared from it.<\/p>\n<p>And so it&#8217;s that an organization that hasn\u2019t been breached is vulnerable to viewing its safety posture as sufficient. Calm seems like proof that the hazard has handed, which modifications habits in ways in which reintroduce the hazard. The idea hardens quietly, even when nobody might state it explicitly: if <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/business-security\/what-cybersecurity-actually-does-for-your-business\/\" target=\"_blank\" rel=\"noopener\">nothing\u2019s gone incorrect<\/a>, then our controls have to be glorious. However in some circumstances, this can be mistaking the absence of proof for proof of absence.<\/p>\n<p>Or, seen by means of one other lens, the absence of a visual incident is simply silence, and silence can imply a number of issues. The corporate with an immaculate document might certainly have top-notch defenses. However it could even have prevented the eye of anybody ill-intentioned and devoted sufficient but \u2013 there are various fish within the sea, in any case.<\/p>\n<p>Which raises at the least two questions value asking: Have you learnt that your atmosphere is as protected as it may be towards threats doing the rounds now? Or do you solely know that your (baseline) controls are in place? Many organizations reply the second query whereas believing that they\u2019ve answered the primary one. They might resort to compliance frameworks, though these don\u2019t essentially verify whether or not the measures are sufficient towards the threats which are doing the rounds proper now. So, an organization may very well be compliant and uncovered on the similar time. (Are you able to, too, odor the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/business-security\/locks-socs-cat-box-what-schrodinger-can-teach-us-about-cybersecurity\/\" target=\"_blank\" rel=\"noopener\">paradox of Schr\u00f6dinger&#8217;s cat<\/a>?)<\/p>\n<h2>But extra traps<\/h2>\n<p>The formal state of a company\u2019s safety is simple to measure and \u2013 assuming all seems properly \u2013 additionally simple to be ok with. Whether or not an worker\u2019s login credentials are altering arms on darkish internet marketplaces or whether or not your group\u2019s EDR device can beneath some circumstances be <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/edr-killers-explained-beyond-the-drivers\/\" target=\"_blank\" rel=\"noopener\">defanged<\/a> by an simply obtainable \u2018anti-tool\u2019 \u2013 that\u2019s tougher to evaluate with out trying in locations many organizations don\u2019t assume to look.<\/p>\n<p>Certainly, the human tendency, absent deliberate correction, is to lean on simply obtainable data with the intention to construct what it believes is a coherent story. This occurs on the expense of hard-to-obtain data and with blissful disregard for which of the 2 classes is extra instructive. Crucially, the thoughts doesn\u2019t flag what\u2019s lacking \u2013 the image feels full and the arrogance feels earned regardless. The late psychologist Daniel Kahneman coined an acronym for the behavior: WYSIATI (What You See Is All There Is).<\/p>\n<p>The issue might worsen additional when you think about what number of decision-makers take into consideration danger: if one thing can\u2019t be measured, it doesn\u2019t matter. In follow, the other is usually nearer to the reality, to the purpose that the underlying downside has earned the standing of a\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/en.wikipedia.org\/wiki\/McNamara_fallacy\" target=\"_blank\" rel=\"noopener\">fallacy<\/a>. With out additional belaboring the purpose, suffice it to say now that after you see at the least a few of the traps, you may\u2019t \u2018unsee\u2019 them.<\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.eset.com\/us\/business\/services\/ecrime-reports\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2026\/04-26\/eti-ecrime.png\" alt=\"eti-ecrime\" width=\"\" height=\"\"\/><\/a><\/p>\n<p>In its <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.verizon.com\/business\/resources\/T16f\/reports\/2025-dbir-data-breach-investigations-report.pdf#page=12\" target=\"_blank\" rel=\"noopener\">2025 Knowledge Breach Investigations Report<\/a>, Verizon put a quantity on how vast the hole between perceived safety and precise publicity can get: it discovered that 54% of ransomware victims had their domains seem in at the least one infostealer log or illicit market posting earlier than the assault. The entry particulars have been already circulating \u2013 and in some circumstances the breach might have already occurred \u2013 even when all the pieces appeared so as.<\/p>\n<p>This sort of blind spot hits hardest in corporations whose safety stack fails to flag attackers\u2019 behavioral footprints, resembling <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/edr-killers-explained-beyond-the-drivers\/\" target=\"_blank\" rel=\"noopener\">makes an attempt to disable safety processes<\/a>. Remedying it requires altering what\u2019s seen and <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.eset.com\/us\/business\/solutions\/xdr-extended-detection-and-response\/\" target=\"_blank\" rel=\"noopener\">utilizing the proper instruments<\/a> \u2013 the sort of instruments that transcend confirming that controls are in place and flag that one thing within the atmosphere is behaving suspiciously.<\/p>\n<h2>When the arrogance shatters<\/h2>\n<p>This all issues additionally as a result of a ransomware intrusion is a enterprise continuity occasion whose results lengthen far and vast. When <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/techcrunch.com\/2025\/01\/27\/how-the-ransomware-attack-at-change-healthcare-went-down-a-timeline\/\" target=\"_blank\" rel=\"noopener\">Change Healthcare fell sufferer<\/a> to ransomware in 2024, the downstream influence on hospitals and pharmacies lasted months, to not point out that the incident hit almost your entire U.S. inhabitants. The whole price was an estimated $3 billion. A ransomware assault on Jaguar Land Rover in 2025 precipitated comparable monetary injury.<\/p>\n<p>In the meantime, IBM places the typical <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"noopener\">price of an information breach<\/a> at round $5 million, together with downtime, restoration, and downstream injury. Particularly for healthcare organizations, the typical is sort of $10 million. And the figures don\u2019t seize the lengthy tail, resembling buyer contracts that aren\u2019t renewed or insurance coverage premiums that spike.<\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/esetworld.com\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2026\/04-26\/eset-world-2026-invite.png\" alt=\"eset-world-2026-invite\" width=\"\" height=\"\"\/><\/a><\/p>\n<p>The injury compounds over months and years, particularly the place stolen information finally ends up on a <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/en\/ransomware\/naming-shaming-ransomware-groups-tighten-screws-victims\/\" target=\"_blank\" rel=\"noopener\">devoted leak website<\/a> (DLS), as is so usually the case nowadays. The general public publicity of company information triggers a disaster in its personal proper because the dumped contracts, emails and private information develop into fodder for follow-on assaults, resembling phishing and <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2022\/04\/26\/trouble-bec-how-stop-costliest-scam\/\" target=\"_blank\" rel=\"noopener\">enterprise e mail compromise<\/a> (BEC) fraud.<\/p>\n<p>Regulatory obligations additionally kick in quickly sufficient. On the similar time, clients and companions begin asking questions that the corporate usually even has no method of answering. And there\u2019s nonetheless one other caveat that defenders ought to take into account: the info solely displays what the criminals select to \u2018promote\u2019 \u2013 it\u2019s thought that solely a small portion of ransomware victims have their information dumped on the websites.<\/p>\n<h2>Self-discipline is all the pieces<\/h2>\n<p>Along with the proper instruments and folks, safety that holds up over time rests on the behavior of watching and adapting. This all relies on consciousness of what\u2019s occurring within the risk atmosphere, to not point out your personal IT atmosphere.<\/p>\n<p>Admittedly, sustaining fixed vigilance within the absence of a visual and acute risk is dear \u2013 psychologically, that&#8217;s. People are poorly suited to staying alert for occasions that don\u2019t really feel imminent, and the drift in the direction of complacency is so gradual that it not often registers as a choice anybody made.<\/p>\n<p>However because the risk aspect of the \u2018equation\u2019 by no means holds nonetheless, the protection aspect can\u2019t, both. Menace intelligence, particularly the type that delivers a wealth of alerts about energetic campaigns, is the spine of that consciousness. It\u2019s what safety instruments can \u2018convert\u2019 into detections and alerts that permit safety groups act in time. With out it, the hole between what a company believes about its safety and what\u2019s really true might proceed to widen \u2013 till it\u2019s closed, somewhat expensively, by cybercriminals.<\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>A breach claims the techniques in addition to the arrogance that was, on reflection, a serious vulnerability 24 Apr 2026 \u00a0\u2022\u00a0 , 5 min. learn There\u2019s a little bit of a sample within the historical past of organizational failures that repeats too usually to be a coincidence: A system runs easily for an extended stretch, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":14216,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[],"class_list":["post-14214","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/14214","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14214"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/14214\/revisions"}],"predecessor-version":[{"id":14215,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/14214\/revisions\/14215"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/14216"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14214"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14214"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14214"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-04-28 03:25:30 UTC -->