Security News > 2021 > July > How cyberattacks exploit known security vulnerabilities
One key way that cybercriminals compromise organizations and users is by exploiting known security vulnerabilities.
Of course, one key way that organizations can protect themselves is by patching known security vulnerabilities.
In a report published Wednesday, security provider Barracuda looked at how attackers scan for and exploit security holes and how organizations can better protect themselves.
In March, Microsoft revealed that a China-based group called Hafnium carried out attacks against organizations by exploiting four zero-day vulnerabilities in Exchange Server.
Cybercriminals rely on a certain method to their madness, mapping out not just how to carry out their attacks but when.
Attackers who exploit security flaws also turn to common attack types.
News URL
Related news
- Google Adds New Pixel Security Features to Block 2G Exploits and Baseband Attacks (source)
- Researchers Uncover Major Security Vulnerabilities in Industrial MMS Protocol Libraries (source)
- The Rise of Zero-Day Vulnerabilities: Why Traditional Security Solutions Fall Short (source)
- HPE Issues Critical Security Patches for Aruba Access Point Vulnerabilities (source)