Security News > 2021 > July > How cyberattacks exploit known security vulnerabilities
One key way that cybercriminals compromise organizations and users is by exploiting known security vulnerabilities.
Of course, one key way that organizations can protect themselves is by patching known security vulnerabilities.
In a report published Wednesday, security provider Barracuda looked at how attackers scan for and exploit security holes and how organizations can better protect themselves.
In March, Microsoft revealed that a China-based group called Hafnium carried out attacks against organizations by exploiting four zero-day vulnerabilities in Exchange Server.
Cybercriminals rely on a certain method to their madness, mapping out not just how to carry out their attacks but when.
Attackers who exploit security flaws also turn to common attack types.
News URL
Related news
- Russian Hackers Exploit Safari and Chrome Flaws in High-Profile Cyberattack (source)
- Despite cyberattacks, water security standards remain a pipe dream (source)
- Chinese Hackers Exploit Visual Studio Code in Southeast Asian Cyberattacks (source)
- Ivanti Releases Urgent Security Updates for Endpoint Manager Vulnerabilities (source)
- Google Adds New Pixel Security Features to Block 2G Exploits and Baseband Attacks (source)