Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Insights from 160 Million Attack Simulations

Posted on August 25, 2025August 25, 2025 By CWS

Safety Data and Occasion Administration (SIEM) techniques act as the first instruments for detecting suspicious exercise in enterprise networks, serving to organizations establish and reply to potential assaults in actual time. Nonetheless, the brand new Picus Blue Report 2025, primarily based on over 160 million real-world assault simulations, revealed that organizations are solely detecting 1 out of seven simulated assaults, displaying a important hole in risk detection and response.
Whereas many organizations consider they’re doing every part they’ll to detect adversary actions, the truth is that numerous threats are slipping by their defenses unnoticed, leaving their networks far too weak to compromise. This hole in detection creates a false sense of safety when attackers have already accessed your delicate techniques, escalated their privileges, or are actively exfiltrating your worthwhile knowledge.
Which begs the query: why, in spite of everything this time, cash, and a focus, are these techniques nonetheless failing? Particularly when the stakes are so excessive. Let’s have a look at what The Blue Report 2025 tells us about a number of lingering core points relating to SIEM rule effectiveness.
Log Assortment Failures: The Basis of Detection Breakdowns
SIEM guidelines act like a safety guard who displays incoming and outgoing site visitors for suspicious habits. Simply as a guard follows a set of directions to establish threats primarily based on particular patterns, SIEM guidelines are pre-configured to detect sure actions, corresponding to unauthorized entry or uncommon community site visitors. When a particular occasion matches a rule, it triggers an alert, permitting safety groups to reply swiftly.
For SIEM guidelines to work successfully, nevertheless, they should analyze a set of dependable and complete logs. The Blue Report 2025 discovered that probably the most widespread causes SIEM guidelines fail is because of persistent log assortment points. In actual fact, in 2025, 50% of detection rule failures have been linked to issues with log assortment. When logs aren’t captured correctly, it is all too simple to overlook important occasions, resulting in a harmful lack of alerts, a false sense of safety, and a failure to detect malicious exercise. Even the best guidelines shortly grow to be ineffective with out correct knowledge to investigate, leaving their organizations weak to assaults.
Frequent log assortment points embrace missed log sources, misconfigured log brokers, and incorrect log settings. For instance, many environments fail to log key knowledge factors or have issues with log forwarding, stopping pertinent logs from reaching the SIEM within the first place. This failure to seize important telemetry considerably hampers a SIEM’s potential to detect an attacker’s malicious exercise.

Misconfigured Detection Guidelines: Silent Failures
Even when logs are collected correctly, detection guidelines can nonetheless fail because of misconfigurations. In actual fact, in 2025, 13% of rule failures have been attributed to configuration points. This consists of incorrect rule thresholds, improperly outlined reference units, and poorly constructed correlation logic. These points could cause important occasions to be missed or set off false positives, undermining the effectiveness of the SIEM system.
For instance, overly broad or generic guidelines can result in an amazing quantity of noise, which frequently ends in essential alerts being buried within the sign, missed totally, or mistakenly ignored. Equally, poorly outlined reference units could cause guidelines to overlook essential indicators of compromise.
Efficiency Points: The Hidden Culprits of Detection Gaps
As SIEM techniques scale to deal with extra knowledge, efficiency points can shortly grow to be one other main hurdle. The report discovered that 24% of detection failures in 2025 have been associated to efficiency issues, corresponding to resource-heavy guidelines, broad customized property definitions, and inefficient queries. These points can considerably decelerate detection and delay response occasions, making it tougher for safety groups to behave shortly after they’re actively underneath assault.
SIEM techniques usually wrestle to course of massive volumes of information, particularly when guidelines usually are not optimized for effectivity. This results in gradual question efficiency, delayed alerts, and overwhelmed system assets, additional lowering the group’s potential to detect real-time threats.

Three Frequent Detection Rule Points
Let’s take a better have a look at the three commonest log assortment points highlighted within the Blue Report 2025.
Probably the most important issues impacting SIEM rule effectiveness is log supply coalescing. This happens when occasion coalescing is enabled for particular log sources like DNS, proxy servers, and Home windows occasion logs, resulting in knowledge loss. On this case, essential occasions could also be compressed or discarded, leading to incomplete knowledge for evaluation. In consequence, important risk behaviors can simply be missed, and detection guidelines can shortly grow to be much less and fewer efficient.
One other prevalent difficulty is unavailable log sources, which account for 10% of rule failures. This usually occurs when logs fail to transmit knowledge because of community disruptions, misconfigured log forwarding brokers, or firewall blocks. With out these logs, the SIEM system can’t seize important occasions, leading to detection guidelines failing to set off alerts.
Lastly, delaying the implementation of cost-effective check filters is a standard reason behind detection failures. When detection guidelines are too broad or inefficient, the system processes extreme quantities of information with out efficient filtering. This will overwhelm the system, slowing efficiency and risking your safety groups lacking key occasions. In response to the report, 8% of detection failures are associated to this difficulty, highlighting the necessity for optimized, cost-effective filtering.

Steady Validation: Making certain SIEM Guidelines Keep Efficient In opposition to Evolving Threats
Whereas detection guidelines are foundational to SIEM techniques, they’ll shortly lose relevance with out steady validation. Adversaries are always evolving their techniques, strategies, and procedures (TTPs), and SIEM guidelines designed to detect recognized patterns grow to be ineffective if they don’t seem to be being often examined in opposition to real-world threats.
The Blue Report 2025 emphasizes that, with out ongoing testing, even well-tuned SIEM techniques can simply grow to be weak to assaults. Steady validation ensures that safety groups do not simply depend on static configurations, however often show that their detection capabilities are working in opposition to the most recent adversary behaviors. This proactive method closes the hole between the theoretical safety provided by detection guidelines and the sensible, real-world effectiveness organizations want in opposition to ever-evolving threats.
By simulating real-world adversary behaviors, safety groups can consider whether or not their detection guidelines are countering the most recent assault strategies, ensuring they’re correctly tuned for particular environments, and that they are figuring out malicious behaviors in a well timed method.
Common publicity validation, by instruments like Breach and Assault Simulation, permits organizations to at all times be testing and fine-tuning their controls. This method makes it simpler to establish their blind spots and enhance their defenses, guaranteeing that SIEM guidelines are efficient, not simply at detecting previous assaults, however at stopping future ones as effectively. With out steady validation, organizations danger their knowledge, model popularity, and backside line to outdated or ineffective defenses, placing their most important belongings at pointless danger.
Closing the Gaps in SIEM Detection
Uncared for SIEM guidelines will inevitably fail to detect trendy threats. Log assortment failures, misconfigurations, and efficiency bottlenecks create blind spots, whereas static guidelines shortly lose effectiveness in opposition to evolving attacker techniques and strategies. With out steady validation, organizations danger working underneath a false sense of safety, leaving important techniques and knowledge uncovered to compromise.

To remain forward, safety groups should often check and tune their SIEM guidelines, simulate real-world assaults, and validate detection pipelines in opposition to the most recent adversary behaviors. Instruments like Breach and Assault Simulation allow organizations to uncover hidden gaps, prioritize high-risk exposures, and be sure that their defenses are working when it issues most.
See the place your SIEM is succeeding and the place it is likely to be silently failing. Obtain the Blue Report 2025 at this time for actionable insights and proposals to strengthen your detection and prevention methods in opposition to tomorrow’s assaults.

Discovered this text fascinating? This text is a contributed piece from one among our valued companions. Observe us on Google Information, Twitter and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Attack, Insights, Million, Simulations

Post navigation

Previous Post: Anatsa Android Banking Trojan Now Targeting 830 Financial Apps
Next Post: Chip Programming Firm Data I/O Hit by Ransomware

Related Posts

RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer The Hacker News
What the 2025 Gartner® Magic Quadrant™ Reveals The Hacker News
Fake Kling AI Facebook Ads Deliver RAT Malware to Over 22 Million Potential Victims The Hacker News
AI-Generated Malicious npm Package Drains Solana Funds from 1,500+ Before Takedown The Hacker News
U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware The Hacker News
Shifting from Monitoring Alerts to Measuring Risk The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats
  • Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3
  • OneFlip: An Emerging Threat to AI that Could Make Vehicles Crash and Facial Recognition Fail
  • Hackers Sabotage Iranian Ships Using Maritime Communications Terminals in Its MySQL Database
  • Proxyware Malware Mimic as YouTube Video Download Site Delivers Malicious Javascripts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats
  • Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3
  • OneFlip: An Emerging Threat to AI that Could Make Vehicles Crash and Facial Recognition Fail
  • Hackers Sabotage Iranian Ships Using Maritime Communications Terminals in Its MySQL Database
  • Proxyware Malware Mimic as YouTube Video Download Site Delivers Malicious Javascripts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News