Security News > 2024 > May > How Can Businesses Defend Themselves Against Common Cyberthreats?
"Zero-day exploits are code vulnerabilities and loopholes that are unknown to software vendors, security researchers and the public. The term 'zero day' originates from the time remaining for a software vendor to patch buggy code. With zero days - or zero hours - to respond, developers are vulnerable to attack and have no time to patch the code and block the hole. One bug can give hackers enough access to explore and map internal networks, exfiltrate valuable data and find other attack vectors."
Recent research found that, alongside financial implications, ransomware's impact could include heart attacks, strokes and PTSD. A ransomware attack is a form of data theft attack, and encrypting is not the only thing that attackers can do when they successfully obtain access to the data.
IoT botnet attacks involve an entire network of connected devices being compromised by a single "Botmaster" and used to carry out coordinated attacks often without the device owners' knowledge.
Many organizations lock their IoT devices using default or weak credentials, which can be easily guessed by an attacker through a brute force credential attack.
Historically, supply chain attacks occurred when an attacker infiltrated a trusted supplier that had been granted access to the victim's data or network to do their job; however, now software supply chain attacks - where the attacker manipulates software that is distributed to many end user organisations - are actually more common.
To execute a supply chain attack, attackers first need to gain access to a crucial part of a target organization's supply chain.
News URL
https://www.techrepublic.com/article/how-to-defend-businesses-against-cyber-threats/