Skip to content
Knowledge base Updated: February 5, 2026

Cyber Threats 2023: Practical Guide Based on Fortinet Threat Landscape Report

Cyber Threats 2023 from nFlo: practical guide based on Fortinet report. Secure your company against the latest threats.

Cybersecurity has become one of the most important aspects of managing modern organizations. The increase in the number of cyberattacks and their complexity forces companies to continuously improve their defensive strategies. In the second half of 2023, the cyber threat landscape underwent significant changes. FortiGuard Labs recorded a 10% increase in unique exploit detections and a 17% increase in detections in organizations. The purpose of this article is to increase awareness of the latest cyber threats and promote solutions offered by our company.

This article is addressed to managers, presidents, IT department heads (CIO), IT department employees, security department employees, CISOs, and compliance and data governance departments. In the following sections, we will discuss the latest trends and threats in cybersecurity, techniques used by cybercriminals, and best practices for security and vulnerability management.

Current Cyber Threat Landscape

Ransomware, Malware, and Botnets

In the second half of 2023, cybercrime reached a new level. FortiGuard Labs recorded a significant increase in the number of ransomware attacks, which have become the main tool used by cybercriminals to extort money from companies. Ransomware continues to dominate the threat landscape, but it is not the only tool used by attackers. Malware and botnets also play a key role in complex attacks on organizations.

Attacks on Critical Infrastructure

The increase in attacks on critical infrastructure is one of the most concerning trends. The FortiGuard Labs report indicated that over 40% of ransomware and wipers were targeted at the industrial sector, showing that cybercriminals are focusing on OT (Operational Technology) and supply chains. Attacks on critical infrastructure can lead to serious disruptions and even disasters, so companies must be particularly vigilant and well-prepared.

Examples of Recent Security Incidents

Recent security incidents show how dangerous cyberattacks can be. In the second half of 2023, an increase in attacks on IoT (Internet of Things) devices was recorded. Devices such as routers, cameras, and other network-connected devices are often poorly protected, making them easy targets for attackers. An example is the attack on Zyxel network devices, which exploited a vulnerability in an end-of-life router, first published in 2017.

📚 Read the complete guide: Ransomware: Ransomware - czym jest, jak się chronić, co robić po ataku

Techniques Used by Cybercriminals

Advanced APT Groups

APT (Advanced Persistent Threats) groups use advanced attack techniques, which often include phishing, vulnerability exploitation, and brute force. In the second half of 2023, FortiGuard Labs identified that 38 of the 143 advanced APT groups listed by MITRE were active. These groups are extremely dangerous because they operate in an organized and targeted manner, often on behalf of governments or large organizations.

Attack Methods

Phishing remains one of the most popular attack methods, used to extract authentication data from company employees. Attacks on system and application vulnerabilities are another popular technique. In the second half of 2023, 41% of organizations detected activity related to exploits that were less than a month old. The speed at which attackers exploit new vulnerabilities forces companies to continuously monitor and update their systems.

Use of Open-Source Tools

The use of open-source tools by cybercriminals to conduct attacks is becoming increasingly common. These tools, such as LokiBot or IcedID, are often used to capture authentication data and other sensitive information. These tools are easily accessible and can be used to conduct advanced attacks with minimal financial outlay.

The Importance of Proper Vulnerability Management

Examples of Most Commonly Exploited Vulnerabilities

Regular updates and system patching are key to protecting against cyberattacks. FortiGuard Labs noted that vulnerabilities such as CVE-2017-17107, which were first published years ago, are still being exploited by cybercriminals. Therefore, companies must regularly update their systems to protect against old and new threats.

The Importance of Regular Updating and Patching Systems

Unfortunately, many companies neglect system updates, which leads to serious consequences. In 86% of cases where unauthorized access was obtained through exploitation of a vulnerability, a patch was already known but had not been implemented. Lack of regular updates and patching can result in serious security breaches and enormous financial losses.

Cases of Negligence and Their Consequences

Negligence in vulnerability management can lead to serious incidents. An example could be the attack on IoT systems, where vulnerabilities in routers and network cameras were exploited to conduct complex attacks on network infrastructure. Companies must be proactive in managing the security of their systems to avoid such situations.

AI and ML in Threat Detection

Technologies such as AI and ML are playing an increasingly important role in threat detection. Artificial intelligence and machine learning enable fast and effective detection of anomalies in network traffic and identification of potential threats before an incident occurs. FortiGuard Labs uses advanced technologies to analyze data from millions of sensors and provide precise threat information.

Zero Trust and Cloud Security

Modern approaches to security, such as Zero Trust and cloud security, are gaining popularity. Zero Trust is based on the principle that no person or device is trusted by default, regardless of whether it is on the internal or external network. Cloud security, on the other hand, focuses on protecting data and applications stored in the cloud from unauthorized access and attacks.

Examples of Newly Implemented Solutions

FortiRecon is one of the newly implemented solutions that provides advanced threat monitoring and analysis. This system uses AI and ML technologies to identify and neutralize threats in real-time. Other modern solutions include network threat detection and response systems (NDR) and advanced next-generation firewalls (NGFW).

The Importance of Training and Building Awareness

The Role of Employee Training

Employee training is a key element of protection against cyber threats. Training programs that teach employees to recognize and respond to threats significantly increase the level of security in the company. Employees must be aware of various attack techniques, such as phishing, to effectively protect company resources.

Examples of Training Programs and Their Effectiveness

Examples of effective training programs include training on phishing, password management, and safe use of mobile devices. These programs can be conducted in the form of interactive online sessions, workshops, or attack simulations. Regular training and tests increase employee awareness and their readiness to respond to threats.

The Importance of Security Culture in the Company

Building a security culture in an organization is essential for effective data and system protection. Security culture involves continuously promoting and implementing best practices in cybersecurity at all levels of the organization. Implementing security policies, regular audits, and supporting employee initiatives in security are key to achieving this goal.

Conclusions and Recommendations

In summary, companies must be aware of the latest threats and apply appropriate protective measures. Key recommendations include regular system updates, investing in advanced security technologies, and conducting employee training. We encourage you to use solutions offered by our company, which provide comprehensive protection against cyber threats.

Summary

Cybersecurity is a dynamically developing field that requires constant attention and adaptation. The increase in the number of attacks, development of new attack techniques, and continuous changes in the threat landscape require companies to take a proactive approach to protecting their resources. Regular updates, advanced technologies, and well-trained employees are key in the fight against cybercrime. Implementing best practices and using modern solutions, such as FortiRecon, can significantly increase the level of security and help companies effectively protect against cyber threats.

Learn key terms related to this article in our cybersecurity glossary:


Learn More

Explore related articles in our knowledge base:


Explore Our Services

Need cybersecurity support? Check out:

Share:

Talk to an expert

Have questions about this topic? Get in touch with our specialist.

Product Manager
Grzegorz Gnych

Grzegorz Gnych

Sales Representative

Response within 24 hours
Free consultation
Individual approach

Providing your phone number will speed up contact.

Want to Reduce IT Risk and Costs?

Book a free consultation - we respond within 24h

Response in 24h Free quote No obligations

Or download free guide:

Download NIS2 Checklist