GreyNoise scans and separates threats from background noise in internet traffic.
The cybersecurity startup GreyNoise Intelligence, which analyses internet scanner data to extract threats from background noise, has released its first 2022 Mass Exploitation Report, an in-depth study of important Threat Detection occurrences of the previous 12 months.
Bob Rudis, Vice President of Research & Data Science GreyNoise Intelligence, stated, “When it comes to cybersecurity, not all vulnerabilities are created equal, and many of the ones that garner media attention actually turn out to be insignificant.
“GreyNoise is in a unique position to help organisations understand what technologies are under mass exploitation, and provides critical tools and data to help security analysts prioritise patching, identify and block malicious sources with confidence, and stay ahead of adversaries.”
In 2022, GreyNoise added more than 230 new detection tags, an increase of almost 38% from 2021.
GreyNoise researchers offer information about the following in their 2022 Mass Exploitation Report:
- A breakdown of the CVE-2022-1388, an F5 Big-IP iControl REST Authentication Bypass, and the celebrity vulnerability hype cycle
- The depth and breadth of CVE-2022-26134, a severe flaw in Atlassian Confluence, demonstrate how determined attackers will never allow a critical vulnerability to go unpatched.
- The effect on defenders of the publication of the CISA Known Exploited Vulnerabilities Catalogue
The GreyNoise VP Data Science Bob Rudis’ predictions for 2023 are included in the 2022 Mass Exploitation Report, along with details on the most significant threat detection events of 2022. He cautions that there will be continual, daily attempts to exploit the internet.
He warns organisations to stay vigilant and diligent when putting services on the internet. More attacks are most likely to happen. More headline-grabbing Log4j-centric attacks are expected to occur. Thus businesses should observe internal attacks and post-initial access.
He says, “Organisations have to strive for perfection, while attackers need only persistence and luck to find that one device or service that is still exposing a weakness. We will see more organisations impacted by this, and it is vital you do what you can to ensure yours isn’t one of them.”
More Stories
Killnet and AnonymousSudan Collaborate to Launch Cyber Attacks on Western Organisations
In recent news, it has been reported that two Russia-sympathetic hacktivist groups, Killnet and AnonymousSudan, have allegedly launched a series...
$4000 Gone In An Instant: Mother Defrauded in Facebook Marketplace Car Deal
A mother of four is warning others to be cautious after believing she had purchased a safe and dependable car...
Shocking Scam: Sydney Family Loses $200K Life-Savings in Suncorp Spoofing Fraud
A family from Sydney has lost their life savings worth $200,000 due to a fraudulent scam. Peter and Madison, who...
Mysterious Money Transfer Leaves Couple Speechless: How They Got an Unsolicited $4000
A young couple in Melbourne claims their bank is making up a personal loan they do not understand. Ashley and...
Phishing + AI + Voice Cloning= Big Trouble: The New Way Criminals are Stealing Your Money
New Alert: Criminals use AI and voice cloning to trick you out of your money. Earlier this year, Microsoft unveiled...
‘Impossible to Spot’ Delivery Scam Email Targets Australia Post Customers – Don’t Fall Victim!
Unsuspecting shoppers should be cautious as a parcel delivery scam that is hard to distinguish targets Australia Post customers. Email...