- Level up your PS5 with this PlayStation VR2 bundle for $250 off before Black Friday
- The 45+ best Black Friday phone deals 2024: Sales on iPhones, Samsung, and more
- I recommend this 15-inch MacBook Air to most people, and it's $255 off for Black Friday
- The 40+ best Black Friday PlayStation 5 deals 2024: Deals available now
- Traditional EDR won't cut it: why you need zero trust endpoint security
Exploitation of Vulnerabilities Soared By 55% in 2022
The number of vulnerabilities exploited in 2022 has grown by 55% compared to 2021, shows a new report by Palo Alto Networks’ Unit 42.
The Network Threat Trends Research Report, volume 2, also suggests Linux malware emerged as a growing concern last year, particularly since 90% of public cloud instances are running on Linux.
The report identifies botnets as the most prevalent type of Linux threat, accounting for 47% of attacks, followed by coin miners at 21% and backdoors at 11%.
ChatGPT scams saw a 910% increase in monthly domain registrations, pointing to an exponential growth in fraudulent activities taking advantage of the widespread usage and popularity of AI-powered chatbots.
Cryptominer traffic has also experienced a doubling in 2022, indicating a growing financial motive behind cybercriminal activities.
Read more on similar attacks: US Regulators Warn Banks About Cryptocurrency Security Risks
According to the latest Unit 42 report, threat actors increasingly leverage newly registered domains (NRDs) to carry out their attacks. Researchers discovered that individuals visiting adult websites were the primary target, accounting for 20.2% of cases, followed by financial services sites at 13.9%.
In addition, the manufacturing, utilities, and energy industries have witnessed a significant surge in malware attacks, particularly those targeting operational technology (OT). The report highlights a staggering 238% increase in malware attacks experienced by organizations within these sectors between 2021 and 2022.
To defend against these growing threats, organizations must prioritize proactive measures to identify vulnerabilities and educate individuals about safe online practices.
By leveraging the insights provided in the Unit 42 report, organizations can take the necessary steps to fortify their defenses and mitigate the risks posed by cyber threats in an ever-changing digital environment.
The report is based on global telemetry data from Palo Alto Networks Next-Generation Firewall (NGFW), Cortex Data Lake, Advanced URL Filtering and Advanced WildFire.