{"id":5890,"date":"2025-08-23T04:07:05","date_gmt":"2025-08-23T04:07:05","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=5890"},"modified":"2025-08-23T04:07:05","modified_gmt":"2025-08-23T04:07:05","slug":"key-findings-from-the-blue-report-2025","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=5890","title":{"rendered":"Key Findings from the Blue Report 2025"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hubs.ly\/Q03CLGfh0\" style=\"display: block;  text-align: center; clear: left; float: left;cursor:pointer\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgrdUMuDFhlzyS_SLbZ46Jo8_xXHeW9DJrpyqkm91g17N62AgWwi55kjVFbiBssob1UMO8v14BZWNcGL4mEzhwcB8dyMtBGd5xdEfT4dWIgTIcXvpjKkUe7FldebR8xdFKz9GqbCIkjDYSb8crjO44gQpwgnuu2Nkfolrh0kRNBeFRsj5IUFhB9_RlJ2Zw\/s728-rw-e365\/picus-main.jpg\" alt=\"\" border=\"0\" data-original-height=\"380\" data-original-width=\"728\"\/><\/a><\/div>\n<p>As safety professionals, it is simple to get caught up in a race to counter the most recent superior adversary strategies. But essentially the most impactful assaults<strong> usually aren&#8217;t from cutting-edge exploits, however from cracked credentials and compromised accounts<\/strong>. Regardless of widespread consciousness of this risk vector, Picus Safety&#8217;s <strong>Blue Report 2025<\/strong> reveals that organizations proceed to wrestle with <strong>stopping password cracking assaults<\/strong> and <strong>detecting the malicious use of compromised accounts<\/strong>.<\/p>\n<p>With the primary half of 2025 behind us, <strong>compromised legitimate accounts stay essentially the most underprevented assault vector<\/strong>, highlighting the pressing want for a <strong>proactive method targeted on the threats which can be evading organizations&#8217; defenses.<\/strong><\/p>\n<h2>A Wake-Up Name: The Alarming Rise in Password Cracking Success<\/h2>\n<p>The <strong><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hubs.ly\/Q03CLGfh0\" rel=\"noopener\" target=\"_blank\">Picus Blue Report<\/a><\/strong> is an annual analysis publication that analyzes how properly organizations are stopping and detecting real-world cyber threats. In contrast to conventional experiences that focus solely on risk traits or survey information, the Blue Report relies on <strong>empirical findings from over 160 million assault simulations<\/strong> carried out inside organizations&#8217; networks around the globe, utilizing the <strong><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.picussecurity.com\/security-validation-platform\" rel=\"noopener\" target=\"_blank\">Picus Safety Validation Platform<\/a><\/strong>.<\/p>\n<p>Within the <strong>Blue Report 2025<\/strong>, Picus Labs discovered that <strong>password cracking makes an attempt succeeded in 46% of examined environments<\/strong>, practically doubling the success price from final 12 months. This sharp enhance highlights a elementary weak spot in how organizations are managing \u2013 or mismanaging \u2013 their password insurance policies. <strong>Weak passwords<\/strong> and <strong>outdated hashing algorithms <\/strong>proceed to depart vital methods weak to attackers utilizing <strong>brute-force<\/strong> or <strong>rainbow desk assaults<\/strong> to crack passwords and achieve unauthorized entry.<\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" name=\"more\"\/><\/p>\n<p>On condition that password cracking is among the <strong>oldest and most reliably efficient assault strategies<\/strong>, this discovering factors to a critical problem: of their race to fight the most recent, most subtle new breed of threats,<strong> many organizations are failing to implement sturdy primary password hygiene insurance policies whereas failing to undertake and combine trendy authentication practices into their defenses<\/strong>.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hubs.ly\/Q03CLGfh0\" style=\"clear: left; display: block; float: left;  text-align: center;cursor:pointer\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjuwxzfApZOQqV2f096xYmgZ_ugfPpnPUeqxNHH0lHZq8vDj2wbMFFhvBSE0n2FPPiC8ppoNforzipfdVTWbYjr8AHwsMbqCFKZ_WZtdEoj2MSjLdkP0l3CMlLF0H9ZEOEaIPIr2rjKHH18ooIh-OuaatCGTS83UuA7qMg82K6m1mLmCUO_1ydzBaw9MFs\/s728-rw-e365\/1.png\" alt=\"\" border=\"0\" data-original-height=\"900\" data-original-width=\"1600\"\/><\/a><\/div>\n<h3><strong>Why Organizations Are Failing to Forestall Password Cracking Assaults<\/strong><\/h3>\n<p>So, why are organizations nonetheless failing to stop password cracking assaults? The foundation trigger lies within the <strong>continued use of weak passwords<\/strong> and <strong>outdated credential storage strategies<\/strong>. Many organizations nonetheless depend on simply guessable passwords and weak hashing algorithms, usually with out utilizing correct salting strategies or multi-factor authentication (MFA).<\/p>\n<p>In truth, our survey outcomes confirmed that <strong><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hubs.ly\/Q03CLGfh0\" rel=\"noopener\" target=\"_blank\">46% of environments<\/a><\/strong><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hubs.ly\/Q03CLGfh0\" rel=\"noopener\" target=\"_blank\"> had at the very least one password hash cracked<\/a> and transformed to cleartext, highlighting the inadequacy of many password insurance policies, significantly for <strong>inside accounts<\/strong>, the place controls are sometimes extra lax than they&#8217;re for his or her exterior counterparts.<\/p>\n<p>To fight this, organizations should <strong>implement stronger password insurance policies<\/strong>, <strong>implement multi-factor authentication (MFA) for all customers<\/strong>, and <strong>usually validate their credential defenses<\/strong>. With out these enhancements, attackers will proceed to compromise legitimate accounts, acquiring easy accessibility to vital methods.<\/p>\n<h3><strong>Credential-Primarily based Assaults: A Silent however Devastating Risk<\/strong><\/h3>\n<p>The specter of <strong>credential abuse<\/strong> is each pervasive and harmful, but because the<strong> Blue Report 2025<\/strong> highlights, organizations are nonetheless <strong>underprepared<\/strong> for this type of assault. And as soon as attackers acquire legitimate credentials, they will <strong>simply transfer laterally<\/strong>, <strong>escalate privileges<\/strong>, and <strong>compromise vital methods<\/strong>.<\/p>\n<p><strong>Infostealers<\/strong> and <strong>ransomware teams<\/strong> ceaselessly depend on stolen credentials to <strong>unfold throughout networks<\/strong>, burrowing deeper and deeper, usually <strong>with out triggering detection<\/strong>. This <strong>stealthy motion<\/strong> throughout the community permits attackers to <strong>keep lengthy dwell occasions<\/strong>, undetected, whereas they <strong>exfiltrate information at will<\/strong>.<\/p>\n<p>Regardless of this ongoing and well-known problem, organizations proceed to prioritize perimeter defenses, usually leaving <strong>id and credential safety<\/strong> ignored and under-funded consequently. This 12 months&#8217;s Blue Report clearly reveals that <strong>legitimate account abuse <\/strong>is on the core of contemporary cyberattacks, reinforcing the pressing want for a stronger concentrate on <strong>id safety<\/strong> and <strong>credential validation<\/strong>.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hubs.ly\/Q03CLGfh0\" style=\"clear: left; display: block; float: left;  text-align: center;cursor:pointer\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhJADp56V-ofQCzLiDedYpWziNxH79FINVohJSXV8k4uNuMHPljcm-J7gMkDb7S7_DrHgV-Lbz3ibXtz0qVglaOFYkOzn0w7GQI7VeFtGNf-Nt8C3Cszkyk9C4NUGvrELDmh5XUA-H0Z8Zw0R08D0aOTF2Fh7b6yVwShgU_WYIAaDu5jXfEZTgQVjQNVcQ\/s728-rw-e365\/2.png\" alt=\"\" border=\"0\" data-original-height=\"512\" data-original-width=\"860\"\/><\/a><\/div>\n<h3><strong>Legitimate Accounts (T1078): The Most Exploited Path to Compromise<\/strong><\/h3>\n<p>One of many key findings within the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hubs.ly\/Q03CLGfh0\" rel=\"noopener\" target=\"_blank\">Blue Report 2025<\/a> is that <strong>Legitimate Accounts (MITRE ATT&amp;CK T1078)<\/strong> stays the <strong>most exploited assault approach<\/strong>, with a really regarding <strong>98% success price<\/strong>. Because of this as soon as attackers achieve entry to legitimate credentials, whether or not by way of <strong>password cracking<\/strong> or <strong>preliminary entry brokers<\/strong>, they will swiftly transfer by way of a corporation&#8217;s community, usually bypassing conventional defenses.<\/p>\n<p>Using <strong>compromised credentials<\/strong> is especially efficient as a result of it permits attackers to <strong>function below the radar<\/strong>, making it tougher for safety groups to detect malicious exercise. As soon as inside, they will <strong>entry delicate information<\/strong>, <strong>deploy malware<\/strong>, or <strong>create new assault paths<\/strong>, all whereas seamlessly mixing in with professional person exercise.<\/p>\n<h3><strong>The best way to Strengthen Your Defenses In opposition to Credential Abuse and Password Cracking<\/strong><\/h3>\n<p>To guard in opposition to more and more efficient assaults, organizations ought to <strong>implement stronger password insurance policies<\/strong> and implement <strong>complexity necessities<\/strong>, whereas eliminating outdated hashing algorithms in favor of safer alternate options. Additionally it is important to <strong>undertake multi-factor authentication (MFA)<\/strong> for all delicate accounts, guaranteeing that even when credentials do develop into compromised, attackers cannot simply use them to entry the community with out a further verification step.<\/p>\n<p>Often validating <strong>credential defenses<\/strong> by way of <strong>simulated assaults<\/strong> is essential to figuring out vulnerabilities and guaranteeing that your controls are performing as anticipated. Organizations additionally must <strong>improve their behavioral detection capabilities<\/strong> to catch <strong>anomalous actions<\/strong> tied to credential abuse and lateral motion.<\/p>\n<p>Moreover, monitoring and inspecting <strong>outbound visitors<\/strong> for indicators of <strong>information exfiltration<\/strong> and guaranteeing that <strong>information loss prevention (DLP) measures<\/strong> are each in place and working successfully are vital to defending your delicate data.<\/p>\n<h3><strong>Closing the Gaps in Credential and Password Administration<\/strong><\/h3>\n<p>The findings within the Blue Report 2025 present that, sadly, many organizations are nonetheless weak to the silent risk of <strong>password cracking<\/strong> and <strong>compromised accounts<\/strong>. And whereas strengthening perimeter defenses continues to be a precedence, it is also clear that <strong>core weaknesses lie in credential administration and inside controls<\/strong>. The report additionally highlighted the truth that <strong>infostealers<\/strong> and <strong>ransomware teams<\/strong> are leveraging these gaps successfully. <\/p>\n<p>In the event you&#8217;re able to take proactive steps to <strong>harden your safety posture<\/strong>, <strong>cut back your publicity<\/strong>, and <strong>prioritize your vital vulnerabilities<\/strong>, the <strong>Blue Report 2025<\/strong> gives invaluable insights to indicate you the place to focus. And at <strong>Picus Safety<\/strong>, we&#8217;re at all times blissful to speak about serving to your group meet its particular safety wants..<\/p>\n<p><strong>Do not forget to get your copy of <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hubs.ly\/Q03CLGfh0\" rel=\"noopener\" target=\"_blank\">The Blue Report 2025<\/a><\/strong> and take proactive steps right now to enhance your safety posture.<\/p>\n<div class=\"cf note-b\">Discovered this text fascinating? <span class=\"\">This text is a contributed piece from considered one of our valued companions.<\/span> Observe us on <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.google.com\/publications\/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ\" rel=\"noopener\" target=\"_blank\">Google Information<\/a>, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/twitter.com\/thehackersnews\" rel=\"noopener\" target=\"_blank\">Twitter<\/a> and <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/thehackernews\/\" rel=\"noopener\" target=\"_blank\">LinkedIn<\/a> to learn extra unique content material we put up.<\/div>\n<\/div>\n<p><template id="QpEBa85EhjLCwDPA1kix"></template><\/script><br \/>\n<br \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As safety professionals, it is simple to get caught up in a race to counter the most recent superior adversary strategies. But essentially the most impactful assaults usually aren&#8217;t from cutting-edge exploits, however from cracked credentials and compromised accounts. Regardless of widespread consciousness of this risk vector, Picus Safety&#8217;s Blue Report 2025 reveals that organizations [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":5892,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[984,2629,1377,770],"class_list":["post-5890","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-blue","tag-findings","tag-key","tag-report"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/5890","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5890"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/5890\/revisions"}],"predecessor-version":[{"id":5891,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/5890\/revisions\/5891"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/5892"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5890"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5890"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5890"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-06 17:36:51 UTC -->