Security News > 2022 > September > Top 8 takeaways from the VMWare Cybersecurity Threat Report
According to VMware, such movements were observed in 25% of all attacks.
One of the best things that organizations can do to counter these types of attacks is to look for ways to improve overall visibility.
The most important thing to keep in mind about zero-day attacks is that such an attack typically cannot succeed unless the attacker manages to acquire the necessary permissions.
23 % of attacks now compromise API security as these platforms emerge as a promising new endpoint for threat actors to exploit.
The VMware study also found that attackers are increasingly exploiting APIs, as well as using tried and true techniques such as SQL injections.
One of the best things that organizations can do to minimize the risks of such attacks is to uninstall any unnecessary software.
News URL
Related news
- THN Recap: Top Cybersecurity Threats, Tools and Tips (Nov 25 - Dec 1) (source)
- ⚡ THN Recap: Top Cybersecurity Threats, Tools and Tips (Dec 2 - 8) (source)
- Australian IT Pros Urged to Guard Against Chinese Cybersecurity Threats (source)
- ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips (source)
- ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips (source)
- The sixth sense of cybersecurity: How AI spots threats before they strike (source)
- ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [30 Dec] (source)
- ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan] (source)
- ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [13 January] (source)
- ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [20 January] (source)