What Vulnerabilities do Attackers Exploit?
Old and New Vulnerabilities Are Regularly Exploited
Meet the Experts
Key Takeaways
⇨ Attackers are exploiting both existing and newly discovered vulnerabilities
⇨ Patching and updating systems and applications can be critical to stopping attacks
⇨ Ensure that you are paying attention not just to responding to ransomware or malware threats but remain focused on more traditional attack vectors such as known vulnerabilities
According to research recently released by Palo Alto Networks, attackers do have vulnerabilities that they prefer to target. In the 2022 Incident Response Report, just six CVE categories accounted for 87% of vulnerabilities being exploited, and in 55% of incidents where the vulnerability was identified it was the ProxyShell category that was targeted. And in…