Recent industry reports have highlighted a high percentage of vulnerability exploits—and an early lead for attackers against organizations looking to find a patch.
Mandiant’s M-Trends, released in April, noted that exploits beat out phishing (second) and prior compromises (third) as the “most prevalent adversary initial infection vector” in the company’s annual study of incident response investigations. Some 38% of intrusions began with an exploit—a 6% increase from 2022, according to the research.
Verizon’s Data Breach Investigations Report, published in May, revealed a 180% increase YoY in vulnerability exploits as an initial step in a breach.
Rapid7’s 2024 Attack Intelligence Report, published on May 21, found that for the second time in three years, more mass compromise events arose from zero-day, or unknown, vulnerabilities than from the known, n-day vulnerabilities.
Verizon discovered a five-day median time for detecting exploitation of the Cybersecurity Infrastructure and Security Agency (CISA) Known Exploited Vulnerabilities (KEV) catalog. (Verizon also found that orgs, on average, took about 55 days to remediate 50% of CISA KEVs once patches became available.)
Keep reading here.—BH
Do you work in IT or have information about your IT department you want to share? Email [email protected].
|