Security News > 2022 > September > Top 8 takeaways from the VMWare Cybersecurity Threat Report
According to VMware, such movements were observed in 25% of all attacks.
One of the best things that organizations can do to counter these types of attacks is to look for ways to improve overall visibility.
The most important thing to keep in mind about zero-day attacks is that such an attack typically cannot succeed unless the attacker manages to acquire the necessary permissions.
23 % of attacks now compromise API security as these platforms emerge as a promising new endpoint for threat actors to exploit.
The VMware study also found that attackers are increasingly exploiting APIs, as well as using tried and true techniques such as SQL injections.
One of the best things that organizations can do to minimize the risks of such attacks is to uninstall any unnecessary software.
News URL
Related news
- StickmanCyber Report: A Look Inside Australia’s Cybersecurity Skills Crisis (source)
- Threat Actors Increasingly Target macOS, Report Finds (source)
- Cyber Security and IT Leadership: A Growing Threat to Australia’s Renewable Energy Efforts (source)
- Top 3 Threat Report Insights for Q2 2024 (source)
- 10 Common Cybersecurity Threats and How to Handle Them (source)
- THN Cybersecurity Recap: Last Week's Top Threats and Trends (September 16-22) (source)
- THN Cybersecurity Recap: Last Week's Top Threats and Trends (September 23-29) (source)
- What Is Threat Hunting In Cybersecurity? (source)