{"id":48234,"date":"2022-08-31T00:00:00","date_gmt":"2022-08-31T00:00:00","guid":{"rendered":"urn:uuid:a53d5cac-2c95-fa3e-f805-e217f460c603"},"modified":"2022-08-31T00:00:00","modified_gmt":"2022-08-31T00:00:00","slug":"tackling-the-growing-and-evolving-digital-attack-surface-2022-midyear-cybersecurity-report","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/tackling-the-growing-and-evolving-digital-attack-surface-2022-midyear-cybersecurity-report\/","title":{"rendered":"Tackling the Growing and Evolving Digital Attack Surface: 2022 Midyear Cybersecurity Report"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/22\/Tackling-the-Growing-and-Evolving-Digital-Attack-Surface-2022-Midyear-Cybersecurity-Report.jpg\"><\/p>\n<p>According to our Trend Micro Smart Protection Network (SPN) platform, Emotet detections soared in the first six months of 2022 with 148,701 detections compared to the 13,811 detections in the first half of the previous year. Based on our telemetry, Japan was the country with the highest number of detections.<\/p>\n<table cellpadding=\"1\" cellspacing=\"0\" border=\"1\" width=\"700\">\n<tbody>\n<tr>\n<th scope=\"col\" colspan=\"2\">Comparison of Emotet detections<\/th>\n<\/tr>\n<tr>\n<td><b>Year<\/b><\/td>\n<td><b>Count<\/b><\/td>\n<\/tr>\n<tr>\n<td>1H 2021<\/td>\n<td>13,811<\/td>\n<\/tr>\n<tr>\n<td>1H 2022<\/td>\n<td>148,701<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><i>Source: Trend Micro Smart Protection Network<\/i><\/p>\n<table cellpadding=\"1\" cellspacing=\"0\" border=\"1\" width=\"700\">\n<tbody>\n<tr>\n<th scope=\"col\" colspan=\"2\">Top five countries with Emotet detections<\/th>\n<\/tr>\n<tr>\n<td><b>Country<\/b><\/td>\n<td><b>1H 2022<\/b><\/td>\n<\/tr>\n<tr>\n<td>Japan<\/td>\n<td>107,669<\/td>\n<\/tr>\n<tr>\n<td>US<\/td>\n<td>4,837<\/td>\n<\/tr>\n<tr>\n<td>India<\/td>\n<td>3,729<\/td>\n<\/tr>\n<tr>\n<td>Italy<\/td>\n<td>3,442<\/td>\n<\/tr>\n<tr>\n<td>Brazil<\/td>\n<td>3,006<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><i>Source: Trend Micro Smart Protection Network<\/i><\/p>\n<p>Ransomware-as-a-service (RaaS) schemes were also prevalent during this period. This model allows developers\u2019 affiliates \u2014 even ones without significant technical knowledge \u2014 to purchase or rent ransomware tools and infrastructures to make attacks even more sophisticated. Based on available data for the first half of 2022, there were 67 active RaaS and extortion groups with over 1,200 victim organizations.&nbsp;<\/p>\n<table cellpadding=\"1\" cellspacing=\"0\" border=\"1\" width=\"700\">\n<tbody readability=\"1\">\n<tr readability=\"2\">\n<td><b>Active RaaS and extortion groups<\/b><\/td>\n<td><b>Victim organizations<\/b><\/td>\n<\/tr>\n<tr>\n<td>57<\/td>\n<td>1,205<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The numbers of active RaaS and extortion groups and the number of victim organizations of successful ransomware attacks in the first half of 202<\/p>\n<p><i>Source: RaaS and extortion groups\u2019 leak sites<\/i><\/p>\n<p>Our SPN data also shows that LockBit, Conti, and BlackCat were the three ransomware families that stood out in the&nbsp;<a href=\"https:\/\/www.trendmicro.com\/vinfo\/ph\/security\/news\/ransomware-by-the-numbers\/lockbit-conti-and-blackcat-lead-pack-amid-rise-in-active-raas-and-extortion-groups-ransomware-in-q1-2022\">RaaS arena<\/a>&nbsp;in terms of detections.<\/p>\n<table cellpadding=\"1\" cellspacing=\"0\" border=\"1\" width=\"700\">\n<tbody>\n<tr>\n<td><b>Ransomware family<\/b><\/td>\n<td><b>1H 2021<\/b><\/td>\n<td><b>1H 2022<\/b><\/td>\n<\/tr>\n<tr>\n<td>LockBit<\/td>\n<td>341<\/td>\n<td>1,843<\/td>\n<\/tr>\n<tr>\n<td>Conti<\/td>\n<td>622<\/td>\n<td>1,090<\/td>\n<\/tr>\n<tr>\n<td>BlackCat<\/td>\n<td>2<\/td>\n<td>1,397<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><i>Source: Trend Micro Smart Protection Network<\/i><\/p>\n<h2><span class=\"body-subhead-title\">The pervasiveness of cloud misconfiguration and cryptocurrency-mining attacks<\/span><\/h2>\n<p>Cloud-based&nbsp;<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/container\">containers<\/a>&nbsp;have been integral to the digital transformation strategies of organizations worldwide. Unfortunately, because of containers\u2019 ubiquity and tendency to be misconfigured, malicious actors continue to target them in varied and evolutionary attacks.<\/p>\n<p>A&nbsp;<a href=\"https:\/\/www.redhat.com\/en\/resources\/kubernetes-adoption-security-market-trends-overview\">survey<\/a>&nbsp;conducted by Red Hat in May 2022 further proves just how substantial the misconfiguration problem in organizations is. 300 DevOps, engineering, and security professionals comprised the respondents, 53% of whom shared that they detected a misconfiguration in their containers and\/or Kubernetes deployments.<\/p>\n<p>In May 2022, we investigated Kubernetes clusters that were publicly exposed via port 10250 and saw over 243,000 exposed cluster nodes via Shodan. It should be noted that almost 600 nodes returned the \u201c200 \u2013 OK\u201d notification, which attackers could exploit by installing and running malicious programs on the kubelet API.<\/p>\n<p>Aside from abusing publicly exposed Kubernetes clusters, cybercriminals also continued to steal cryptocurrency-mining capabilities from victims\u2019 resources in the first half of the year. We determined the five most prominent actor groups in the cryptocurrency-mining space based on research we conducted last year and published earlier this year:&nbsp;<a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/18\/k\/outlaw-group-distributes-botnet-for-cryptocurrency-mining-scanning-and-brute-force.html\">Outlaw<\/a>&nbsp;targets&nbsp;<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/internet-of-things#:~:text=The%20IoT%20can%20be%20described,of%20computing%20and%20analytical%20capabilities.\">internet-of-things (IoT)<\/a>&nbsp;devices and Linux cloud servers by exploiting known vulnerabilities or performing brute-force Secure Shell Protocol (SSH) attacks, while&nbsp;<a href=\"https:\/\/documents.trendmicro.com\/assets\/white_papers\/wp-tracking-the-activities-of-teamTNT.pdf\">TeamTNT<\/a>&nbsp;is one of the most technically proficient threat actors focused on cryptocurrency mining.&nbsp;<a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/20\/k\/analysis-of-kinsing-malwares-use-of-rootkit.html\">Kinsing<\/a>&nbsp;is known for quickly abusing new exploits (including the Log4Shell vulnerability) in a short period, while 8220 is known for exploiting Oracle WebLogic vulnerabilities. Finally, Kek Security is a relatively new group that uses sophisticated techniques and integrates new exploits in its attacks.<\/p>\n<h2><span class=\"body-subhead-title\">Protecting organizations from sophisticated and complex threats amid an expanding attack surface<\/span><\/h2>\n<p>Two years&nbsp;<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/libs\/clientlibs\/granite\/richtext\/resources\/images\/blank.png\" width=\"11\" height=\"12\">after the onset of a global health crisis, many organizations around the world have started to return to their offices, while the rest have opted for a hybrid or a permanent remote work setup. To keep interconnected working environments and new tools and technologies secure, cybersecurity teams require a strong and unified cybersecurity strategy that can cover the burgeoning digital attack surface. Read our midyear cybersecurity report, <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/threat-reports\/roundup\/defending-the-expanding-attack-surface-trend-micro-2022-midyear-cybersecurity-report\">\u201cDefending the Expanding Attack Surface,\u201d<\/a> to learn more about the threat landscape in the first half of 2022 and gain critical insights on security protocols and best practices.<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/22\/h\/tackling-the-growing-and-evolving-digital-attack-surface-2022-mi.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This blog entry highlights the threats that dominated the first six months of the year, which we discussed in detail in our midyear cybersecurity roundup report, \u201cDefending the Expanding Attack Surface.\u201d Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9520,9511,9565,9508,9509],"class_list":["post-48234","post","type-post","status-publish","format-standard","hentry","category-trendmicro","tag-trend-micro-research-cloud","tag-trend-micro-research-cyber-threats","tag-trend-micro-research-data-center","tag-trend-micro-research-endpoints","tag-trend-micro-research-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tackling the Growing and Evolving Digital Attack Surface: 2022 Midyear Cybersecurity Report 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/tackling-the-growing-and-evolving-digital-attack-surface-2022-midyear-cybersecurity-report\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tackling the Growing and Evolving Digital Attack Surface: 2022 Midyear Cybersecurity Report 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/tackling-the-growing-and-evolving-digital-attack-surface-2022-midyear-cybersecurity-report\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-31T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/22\/Tackling-the-Growing-and-Evolving-Digital-Attack-Surface-2022-Midyear-Cybersecurity-Report.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tackling-the-growing-and-evolving-digital-attack-surface-2022-midyear-cybersecurity-report\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tackling-the-growing-and-evolving-digital-attack-surface-2022-midyear-cybersecurity-report\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Tackling the Growing and Evolving Digital Attack Surface: 2022 Midyear Cybersecurity Report\",\"datePublished\":\"2022-08-31T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tackling-the-growing-and-evolving-digital-attack-surface-2022-midyear-cybersecurity-report\\\/\"},\"wordCount\":605,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tackling-the-growing-and-evolving-digital-attack-surface-2022-midyear-cybersecurity-report\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.trendmicro.com\\\/content\\\/dam\\\/trendmicro\\\/global\\\/en\\\/research\\\/thumbnails\\\/22\\\/Tackling-the-Growing-and-Evolving-Digital-Attack-Surface-2022-Midyear-Cybersecurity-Report.jpg\",\"keywords\":[\"Trend Micro Research : Cloud\",\"Trend Micro Research : Cyber Threats\",\"Trend Micro Research : Data center\",\"Trend Micro Research : Endpoints\",\"Trend Micro Research : Research\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tackling-the-growing-and-evolving-digital-attack-surface-2022-midyear-cybersecurity-report\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tackling-the-growing-and-evolving-digital-attack-surface-2022-midyear-cybersecurity-report\\\/\",\"name\":\"Tackling the Growing and Evolving Digital Attack Surface: 2022 Midyear Cybersecurity Report 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tackling-the-growing-and-evolving-digital-attack-surface-2022-midyear-cybersecurity-report\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tackling-the-growing-and-evolving-digital-attack-surface-2022-midyear-cybersecurity-report\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.trendmicro.com\\\/content\\\/dam\\\/trendmicro\\\/global\\\/en\\\/research\\\/thumbnails\\\/22\\\/Tackling-the-Growing-and-Evolving-Digital-Attack-Surface-2022-Midyear-Cybersecurity-Report.jpg\",\"datePublished\":\"2022-08-31T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tackling-the-growing-and-evolving-digital-attack-surface-2022-midyear-cybersecurity-report\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tackling-the-growing-and-evolving-digital-attack-surface-2022-midyear-cybersecurity-report\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tackling-the-growing-and-evolving-digital-attack-surface-2022-midyear-cybersecurity-report\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.trendmicro.com\\\/content\\\/dam\\\/trendmicro\\\/global\\\/en\\\/research\\\/thumbnails\\\/22\\\/Tackling-the-Growing-and-Evolving-Digital-Attack-Surface-2022-Midyear-Cybersecurity-Report.jpg\",\"contentUrl\":\"https:\\\/\\\/www.trendmicro.com\\\/content\\\/dam\\\/trendmicro\\\/global\\\/en\\\/research\\\/thumbnails\\\/22\\\/Tackling-the-Growing-and-Evolving-Digital-Attack-Surface-2022-Midyear-Cybersecurity-Report.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tackling-the-growing-and-evolving-digital-attack-surface-2022-midyear-cybersecurity-report\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Cloud\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-cloud\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Tackling the Growing and Evolving Digital Attack Surface: 2022 Midyear Cybersecurity Report\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tackling the Growing and Evolving Digital Attack Surface: 2022 Midyear Cybersecurity Report 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/tackling-the-growing-and-evolving-digital-attack-surface-2022-midyear-cybersecurity-report\/","og_locale":"en_US","og_type":"article","og_title":"Tackling the Growing and Evolving Digital Attack Surface: 2022 Midyear Cybersecurity Report 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/tackling-the-growing-and-evolving-digital-attack-surface-2022-midyear-cybersecurity-report\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-08-31T00:00:00+00:00","og_image":[{"url":"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/22\/Tackling-the-Growing-and-Evolving-Digital-Attack-Surface-2022-Midyear-Cybersecurity-Report.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/tackling-the-growing-and-evolving-digital-attack-surface-2022-midyear-cybersecurity-report\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/tackling-the-growing-and-evolving-digital-attack-surface-2022-midyear-cybersecurity-report\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Tackling the Growing and Evolving Digital Attack Surface: 2022 Midyear Cybersecurity Report","datePublished":"2022-08-31T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/tackling-the-growing-and-evolving-digital-attack-surface-2022-midyear-cybersecurity-report\/"},"wordCount":605,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/tackling-the-growing-and-evolving-digital-attack-surface-2022-midyear-cybersecurity-report\/#primaryimage"},"thumbnailUrl":"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/22\/Tackling-the-Growing-and-Evolving-Digital-Attack-Surface-2022-Midyear-Cybersecurity-Report.jpg","keywords":["Trend Micro Research : Cloud","Trend Micro Research : Cyber Threats","Trend Micro Research : Data center","Trend Micro Research : Endpoints","Trend Micro Research : Research"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/tackling-the-growing-and-evolving-digital-attack-surface-2022-midyear-cybersecurity-report\/","url":"https:\/\/www.threatshub.org\/blog\/tackling-the-growing-and-evolving-digital-attack-surface-2022-midyear-cybersecurity-report\/","name":"Tackling the Growing and Evolving Digital Attack Surface: 2022 Midyear Cybersecurity Report 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/tackling-the-growing-and-evolving-digital-attack-surface-2022-midyear-cybersecurity-report\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/tackling-the-growing-and-evolving-digital-attack-surface-2022-midyear-cybersecurity-report\/#primaryimage"},"thumbnailUrl":"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/22\/Tackling-the-Growing-and-Evolving-Digital-Attack-Surface-2022-Midyear-Cybersecurity-Report.jpg","datePublished":"2022-08-31T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/tackling-the-growing-and-evolving-digital-attack-surface-2022-midyear-cybersecurity-report\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/tackling-the-growing-and-evolving-digital-attack-surface-2022-midyear-cybersecurity-report\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/tackling-the-growing-and-evolving-digital-attack-surface-2022-midyear-cybersecurity-report\/#primaryimage","url":"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/22\/Tackling-the-Growing-and-Evolving-Digital-Attack-Surface-2022-Midyear-Cybersecurity-Report.jpg","contentUrl":"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/22\/Tackling-the-Growing-and-Evolving-Digital-Attack-Surface-2022-Midyear-Cybersecurity-Report.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/tackling-the-growing-and-evolving-digital-attack-surface-2022-midyear-cybersecurity-report\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Cloud","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-cloud\/"},{"@type":"ListItem","position":3,"name":"Tackling the Growing and Evolving Digital Attack Surface: 2022 Midyear Cybersecurity Report"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48234","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=48234"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48234\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=48234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=48234"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=48234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}