Security News > 2021 > July > How cyberattacks exploit known security vulnerabilities
One key way that cybercriminals compromise organizations and users is by exploiting known security vulnerabilities.
Of course, one key way that organizations can protect themselves is by patching known security vulnerabilities.
In a report published Wednesday, security provider Barracuda looked at how attackers scan for and exploit security holes and how organizations can better protect themselves.
In March, Microsoft revealed that a China-based group called Hafnium carried out attacks against organizations by exploiting four zero-day vulnerabilities in Exchange Server.
Cybercriminals rely on a certain method to their madness, mapping out not just how to carry out their attacks but when.
Attackers who exploit security flaws also turn to common attack types.
News URL
Related news
- Decades-Old Security Vulnerabilities Found in Ubuntu's Needrestart Package (source)
- RomCom Exploits Zero-Day Firefox and Windows Flaws in Sophisticated Cyberattacks (source)
- Ivanti Issues Critical Security Updates for CSA and Connect Secure Vulnerabilities (source)
- Deloitte says cyberattack on Rhode Island benefits portal carries 'major security threat' (source)
- Hackers Exploit Webview2 to Deploy CoinLurker Malware and Evade Security Detection (source)
- Critical security hole in Apache Struts under exploit (source)
- New botnet exploits vulnerabilities in NVRs, TP-Link routers (source)
- FICORA and Kaiten Botnets Exploit Old D-Link Vulnerabilities for Global Attacks (source)
- Security pros baited with fake Windows LDAP exploit traps (source)