Security News > 2021 > July > How cyberattacks exploit known security vulnerabilities

One key way that cybercriminals compromise organizations and users is by exploiting known security vulnerabilities.
Of course, one key way that organizations can protect themselves is by patching known security vulnerabilities.
In a report published Wednesday, security provider Barracuda looked at how attackers scan for and exploit security holes and how organizations can better protect themselves.
In March, Microsoft revealed that a China-based group called Hafnium carried out attacks against organizations by exploiting four zero-day vulnerabilities in Exchange Server.
Cybercriminals rely on a certain method to their madness, mapping out not just how to carry out their attacks but when.
Attackers who exploit security flaws also turn to common attack types.
News URL
Related news
- North Korean Hackers Exploit PowerShell Trick to Hijack Devices in New Cyberattack (source)
- Compliance Isn’t Security: Why a Checklist Won’t Stop Cyberattacks (source)
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159) (source)
- Google's March 2025 Android Security Update Fixes Two Actively Exploited Vulnerabilities (source)
- Stealthy Apache Tomcat Critical Exploit Bypasses Security Filters: Are You at Risk? (source)
- Ongoing Cyber Attacks Exploit Critical Vulnerabilities in Cisco Smart Licensing Utility (source)
- Android Malware Exploits a Microsoft-Related Security Blind Spot to Avoid Detection (source)
- Still Using an Older Version of iOS or iPadOS? Update Now to Patch These Critical Security Vulnerabilities (source)