What Vulnerabilities do Attackers Exploit?

Old and New Vulnerabilities Are Regularly Exploited

Published: 02/August/2022

Reading time: 2 mins

Meet the Experts

Key Takeaways

⇨ Attackers are exploiting both existing and newly discovered vulnerabilities

⇨ Patching and updating systems and applications can be critical to stopping attacks

⇨ Ensure that you are paying attention not just to responding to ransomware or malware threats but remain focused on more traditional attack vectors such as known vulnerabilities

According to research recently released by Palo Alto Networks, attackers do have vulnerabilities that they prefer to target. In the 2022 Incident Response Report, just six CVE categories accounted for 87% of vulnerabilities being exploited, and in 55% of incidents where the vulnerability was identified it was the ProxyShell category that was targeted. And in…

Mastering SAP Premium Access Membership Required

You must be a Mastering SAP Premium Access member to access this content.

Join Now

Already a member? Log in here

More Resources

See All Related Content