, ,

The impact of legacy vulnerabilities in today’s cybersecurity landscape

The digital revolution has irrevocably transformed how we live, work, and interact – and has driven data protection and cybersecurity to the forefront of business concern. With this interconnectedness comes an increasingly large attack surface for malicious actors to target. The temptation for businesses looking to combat these threats is to focus resources, effort and attention to the headlines related to the ‘unknown’ – AI, novel, zero-day cyber threats that haven’t yet been extensively studied or successfully combated in the wild.

Naturally, for many security teams, identifying and mitigating against these threats, particularly in the era of AI, will take an absolute priority, with concern about the scale of financial damage and operational impact they can cause. However, for small to medium businesses (SMBs), the exploitation of known vulnerabilities – sometimes ones that are several years old – still represents a key cybersecurity challenge. In short, vulnerabilities are weaknesses in systems, applications, processes, and even human behavior that attackers can exploit to gain unauthorized access, steal sensitive data, or disrupt operations. 

These vulnerabilities come in many forms. Programming errors and software flaws can create openings for attackers to inject malicious code or bypass security controls. Improperly configured systems or devices leave them exposed to unauthorized access or manipulation. Weak passwords, the bane of cybersecurity professionals everywhere, are easily cracked or stolen, granting attackers access to accounts and networks. Deceptive tactics, known as social engineering can trick users into revealing sensitive information or clicking on malicious links.

The consequences of exploited vulnerabilities can be devastating. Data breaches expose sensitive customer information, intellectual property, or financial records, leading to financial losses, reputational damage, and even legal and legislative repercussions. Ransomware attacks, a growing scourge, encrypt critical data, paralyzing operations until hefty ransoms are paid. Disruptions caused by cyberattacks can cost companies millions of dollars and significantly erode consumer trust.

The vulnerability landscape – older methods still dominate

Of course, it remains necessary to dedicate resources and time to the identification and mitigation of novel threats, however, new data confirms that existing vulnerabilities still represent one of the most significant cybersecurity challenges facing SMBs. SonicWall’s Intrusion Prevention System (IPS) data from January 2022 to March 2024 reveals the following top 5 most widespread networking attacks targeting small businesses:

  • Log4j (CVE-2021-44228) (43%) 
  • Fortinet SSL VPN CVE-2018-13379 (35%) 
  • Heartbleed (CVE-2014-0160 ) (35%) 
  • Atlassian CVE-2021-26085 (32%) 
  • Vmware CVE-2021-21975 (28%)

Of the top five most widely used network attacks against SMBs, the ‘newest’ vulnerability represented were nearly three years old, while the oldest were over a decade old – which is primitive when considering the modern threat environment. The results are a clear reminder for CISOs and cybersecurity leaders that they must assess organizational threats based on their own current threat landscape, and specifically the main cybersecurity risks facing their organizations – rather than getting swept up in the latest media buzz.

Given the level of knowledge, and the widespread availability of patches available, this tactic may come as a surprise to security teams. However, there are several factors which continue to make the exploitation of known vulnerabilities valuable for attackers. It’s often the case that cybercriminals seek to take the path of least resistance when carrying out cyberattacks – which means testing known exploits, for which they have developed particularly strong techniques, before moving on to more time intensive and strategically planned intrusions.

For SMBs, particularly those in highly regulated or critical industries, balancing the need for continued function of their existing technology stack, with the financial cost and skills required to patch known vulnerabilities means many of these are left at risk, indefinitely. For SMBs, this makes the use of Managed Service Providers (MSPs), who can apply testing, knowledge, industry leading tools and set up automated patches, particularly attractive.

How can SMBs reduce the risk of known exploits?

The fight against cyber threats is a never-ending exercise. Vulnerabilities emerge constantly, and attackers are relentless in their pursuit of exploiting them – even years after they have first been identified. This underscores the critical nature of staying informed about threats, patching vulnerabilities promptly, and implementing a layered security approach.

For SMBs, building a more secure digital future requires a combination of strong cybersecurity strategy at the leadership level and the intelligent application of MSPs who can employ the gold standard of cybersecurity tools and knowledge, and help reduce the risks posed by known vulnerabilities.

Ultimately, Cybersecurity leaders need to ensure they are sufficiently prioritising threats, and allocating resources and time based specifically on how much risk is facing an organisation. This prioritisation is a key step in ensuring the strongest possible cybersecurity. This requires a fundamental understanding of the specific risk landscape facing each industry, and avoiding being caught up by the latest, most terrifying AI trend.

We've listed the best patch management software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

https://www.techradar.com/pro/the-impact-of-legacy-vulnerabilities-in-todays-cybersecurity-landscape


September 2024
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
30  

About Us

Welcome to encircle News! We are a cutting-edge technology news company that is dedicated to bringing you the latest and greatest in everything tech. From automobiles to drones, software to hardware, we’ve got you covered.

At encircle News, we believe that technology is more than just a tool, it’s a way of life. And we’re here to help you stay on top of all the latest trends and developments in this ever-evolving field. We know that technology is constantly changing, and that can be overwhelming, but we’re here to make it easy for you to keep up.

We’re a team of tech enthusiasts who are passionate about everything tech and love to share our knowledge with others. We believe that technology should be accessible to everyone, and we’re here to make sure it is. Our mission is to provide you with fun, engaging, and informative content that helps you to understand and embrace the latest technologies.

From the newest cars on the road to the latest drones taking to the skies, we’ve got you covered. We also dive deep into the world of software and hardware, bringing you the latest updates on everything from operating systems to processors.

So whether you’re a tech enthusiast, a business professional, or just someone who wants to stay up-to-date on the latest advancements in technology, encircle News is the place for you. Join us on this exciting journey and be a part of shaping the future.

Podcasts

TWiT 998: Artisanal Locally-Sourced Dopamine – Amazon Returns to Office, CA AI Bill, Elon Backs Down This Week in Tech (Audio)

Amazon Returns to Office, CA AI Bill, Elon Backs Down Discussion of the iPhone 16 Qualcomm Approached Intel About a Takeover in Recent Days Hezbollah Pagers Explode in Apparent Attack Across Lebanon Elon Musk's X Backs Down in Brazil Bluesky tops 10 million users Newsom signs California bill to limit 'addictive' social media feeds for kids The AI bill driving a wedge through Silicon Valley Microsoft Would Restart Three Mile Island Nuclear Plant to Power AI Bill requiring AM radio in new cars gets closer to law Mozilla exits the fediverse and will shutter its Mastodon server in December Amazon tells employees to return to office five days a week Host: Leo Laporte Guests: Ben Parr, Alex Lindsay, and Rob Pegoraro Download or subscribe to this show at https://twit.tv/shows/this-week-in-tech Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: NetSuite.com/TWIT canary.tools/twit – use code: TWIT expressvpn.com/twit shopify.com/twit veeam.com
  1. TWiT 998: Artisanal Locally-Sourced Dopamine – Amazon Returns to Office, CA AI Bill, Elon Backs Down
  2. TWiT 997: Put an OLED on it – iPhone Event 2024, $700 PS5, AI in AU
  3. TWiT 996: The Quiet Office Crackdown – Starlink Backtracks, AI Royalty Heist
  4. TWiT 995: The Story of Us – AnandTech Shuts Down, Brazil Bans X, Alexa Revamp
  5. TWiT 994: Time Moves On, but I Don't – Pavel Durov Arrested, Hacking Bikes, Apple Event Rumors