Security News > 2022 > August > Highlighting What should be Patched First at the Endpoint
While this Global Threat Landscape Report is filled with information, charts, and graphs, one area of interest to security leaders is Figure 3 titled "Comparing CVEs by IPS activity and endpoint detections." CVE stands for "Common Vulnerabilities and Exposures" and it is a list of publicly disclosed computer security flaws.
These vulnerabilities could well be attacked next and should be patched before other less-likely vulnerabilities are.
Advanced endpoint technology can help mitigate and effectively remediate infected devices at an early stage of an attack.
The Endpoint Is Not What It Used to Be. Attacking endpoints is top of mind for cybercriminals because they found in the last three years-with the pandemic and work-from-home and work-from-anywhere-that this is a great way to infiltrate corporate networks.
Even though people are coming back into office buildings and workplaces, endpoint security needs to remain top of mind.
As we say in the report, "While we can never truly predict what [or where] criminals will hit nextthis gives us a good indicator of where criminals are starting to sniff around...Endpoint technology can help mitigate and effectively remediate infected units at an early stage of an attack. Endpoint vulnerabilities can be used for early access to the organization infrastructure with the goal to move to a more profitable location laterally. This is the reason that coordination of endpoint, network, and cloud threat intelligence is so effective in preventing and responding to attacks across multiple stages...".