Security News > 2022 > September > Top 8 takeaways from the VMWare Cybersecurity Threat Report
According to VMware, such movements were observed in 25% of all attacks.
One of the best things that organizations can do to counter these types of attacks is to look for ways to improve overall visibility.
The most important thing to keep in mind about zero-day attacks is that such an attack typically cannot succeed unless the attacker manages to acquire the necessary permissions.
23 % of attacks now compromise API security as these platforms emerge as a promising new endpoint for threat actors to exploit.
The VMware study also found that attackers are increasingly exploiting APIs, as well as using tried and true techniques such as SQL injections.
One of the best things that organizations can do to minimize the risks of such attacks is to uninstall any unnecessary software.
News URL
Related news
- THN Cybersecurity Recap: Top Threats, Tools and News (Oct 21 - Oct 27) (source)
- Everything You Need to Know about the Malvertising Cybersecurity Threat (source)
- Enterprise Identity Threat Report 2024: Unveiling Hidden Threats to Corporate Identities (source)
- THN Recap: Top Cybersecurity Threats, Tools, and Practices (Oct 28 - Nov 03) (source)
- The cybersecurity gender gap: How diverse teams improve threat response (source)
- THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 04 - Nov 10) (source)
- THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 11 - Nov 17) (source)
- THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 18 - Nov 24) (source)
- THN Recap: Top Cybersecurity Threats, Tools and Tips (Nov 25 - Dec 1) (source)
- ⚡ THN Recap: Top Cybersecurity Threats, Tools and Tips (Dec 2 - 8) (source)