Security News > 2021 > July > How cyberattacks exploit known security vulnerabilities

One key way that cybercriminals compromise organizations and users is by exploiting known security vulnerabilities.
Of course, one key way that organizations can protect themselves is by patching known security vulnerabilities.
In a report published Wednesday, security provider Barracuda looked at how attackers scan for and exploit security holes and how organizations can better protect themselves.
In March, Microsoft revealed that a China-based group called Hafnium carried out attacks against organizations by exploiting four zero-day vulnerabilities in Exchange Server.
Cybercriminals rely on a certain method to their madness, mapping out not just how to carry out their attacks but when.
Attackers who exploit security flaws also turn to common attack types.
News URL
Related news
- Security pros baited with fake Windows LDAP exploit traps (source)
- Zimbra Releases Security Updates for SQL Injection, Stored XSS, and SSRF Vulnerabilities (source)
- North Korean Hackers Exploit PowerShell Trick to Hijack Devices in New Cyberattack (source)
- Compliance Isn’t Security: Why a Checklist Won’t Stop Cyberattacks (source)
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159) (source)