Cyber attacks have dramatically improved in the last few years. Many threat actors have developed more effective strategies for infiltrating their targets in a shorter period. A cybersecurity company recently released a report on its findings.
Rapid7, a cloud risk and threat detection leader, recently published its Rapid7 2022 Vulnerability Intelligence Report.
According to Caitlin Condon, the company’s vulnerability research manager and report’s lead author, “Rapid7’s team of vulnerability researchers works around the clock to thoroughly investigate and provide critical context into emergent threats. We produce the annual Vulnerability Intelligence Report to help organisations understand attack trends and proactively address the unique and shared threats they face.”
The report includes attacker use cases and discusses exploitation trends. It also offers its readers a structured approach to understanding new security threats. The report’s most significant finding is that 56 per cent of vulnerabilities were exploited within the first seven days of public disclosure. Attackers are now developing and deploying ways to speed up the process of their attacks.
Fifty-six per cent is a 12 per cent increase compared to 2021 and a staggering 87 per cent increase compared to the 2020 findings. Condon added, “the ransomware ecosystem and the cybercrime economy have continued to mature and evolve. We saw many more ransomware families actively compromising organisations in 2022, naturally creating threat tracking and reporting challenges.”
The report also categorised the vulnerabilities into three categories, threats, widespread threats, and impending threats. Among the three, Rapid7 identified that many bug datasets belonged to widespread threats. This means it is more likely to impact many organisations than a targeted few.
The company also noted that attackers still use ‘celebrity’ vulnerabilities like Log4Shell and Folllina. The report also mentioned mass attacks sustained by VMware Vcenter and Horizon and Ubiquiti UniFi controllers, and Zyxel devices, as these offer initial access vectors.
More Stories
Killnet and AnonymousSudan Collaborate to Launch Cyber Attacks on Western Organisations
In recent news, it has been reported that two Russia-sympathetic hacktivist groups, Killnet and AnonymousSudan, have allegedly launched a series...
$4000 Gone In An Instant: Mother Defrauded in Facebook Marketplace Car Deal
A mother of four is warning others to be cautious after believing she had purchased a safe and dependable car...
Shocking Scam: Sydney Family Loses $200K Life-Savings in Suncorp Spoofing Fraud
A family from Sydney has lost their life savings worth $200,000 due to a fraudulent scam. Peter and Madison, who...
Mysterious Money Transfer Leaves Couple Speechless: How They Got an Unsolicited $4000
A young couple in Melbourne claims their bank is making up a personal loan they do not understand. Ashley and...
Phishing + AI + Voice Cloning= Big Trouble: The New Way Criminals are Stealing Your Money
New Alert: Criminals use AI and voice cloning to trick you out of your money. Earlier this year, Microsoft unveiled...
‘Impossible to Spot’ Delivery Scam Email Targets Australia Post Customers – Don’t Fall Victim!
Unsuspecting shoppers should be cautious as a parcel delivery scam that is hard to distinguish targets Australia Post customers. Email...