Glowing lock interface on blue background. Digital security and protection concept. 3D Rendering

What Vulnerabilities do Attackers Exploit?

Old and New Vulnerabilities Are Regularly Exploited

Reading time: 2 mins

Meet the Experts

Key Takeaways

⇨ Attackers are exploiting both existing and newly discovered vulnerabilities

⇨ Patching and updating systems and applications can be critical to stopping attacks

⇨ Ensure that you are paying attention not just to responding to ransomware or malware threats but remain focused on more traditional attack vectors such as known vulnerabilities

According to research recently released by Palo Alto Networks, attackers do have vulnerabilities that they prefer to target. In the 2022 Incident Response Report, just six CVE categories accounted for 87% of vulnerabilities being exploited, and in 55% of incidents where the vulnerability was identified it was the ProxyShell category that was targeted. And in...

This content is for SAPinsider Monthly Subscription, SAPinsider Annual Subscription, and SAPinsider Premium Annual Subscription members only.
Log In Join Now

More Resources

See All Related Content