- Buy Microsoft Visio Professional or Microsoft Project Professional 2024 for just $80
- Get Microsoft Office Pro and Windows 11 Pro for 87% off with this bundle
- Buy or gift a Babbel subscription for 78% off to learn a new language - new low price
- Join BJ's Wholesale Club for just $20 right now to save on holiday shopping
- This $28 'magic arm' makes taking pictures so much easier (and it's only $20 for Black Friday)
Exploitation of Vulnerabilities Soared By 55% in 2022
The number of vulnerabilities exploited in 2022 has grown by 55% compared to 2021, shows a new report by Palo Alto Networks’ Unit 42.
The Network Threat Trends Research Report, volume 2, also suggests Linux malware emerged as a growing concern last year, particularly since 90% of public cloud instances are running on Linux.
The report identifies botnets as the most prevalent type of Linux threat, accounting for 47% of attacks, followed by coin miners at 21% and backdoors at 11%.
ChatGPT scams saw a 910% increase in monthly domain registrations, pointing to an exponential growth in fraudulent activities taking advantage of the widespread usage and popularity of AI-powered chatbots.
Cryptominer traffic has also experienced a doubling in 2022, indicating a growing financial motive behind cybercriminal activities.
Read more on similar attacks: US Regulators Warn Banks About Cryptocurrency Security Risks
According to the latest Unit 42 report, threat actors increasingly leverage newly registered domains (NRDs) to carry out their attacks. Researchers discovered that individuals visiting adult websites were the primary target, accounting for 20.2% of cases, followed by financial services sites at 13.9%.
In addition, the manufacturing, utilities, and energy industries have witnessed a significant surge in malware attacks, particularly those targeting operational technology (OT). The report highlights a staggering 238% increase in malware attacks experienced by organizations within these sectors between 2021 and 2022.
To defend against these growing threats, organizations must prioritize proactive measures to identify vulnerabilities and educate individuals about safe online practices.
By leveraging the insights provided in the Unit 42 report, organizations can take the necessary steps to fortify their defenses and mitigate the risks posed by cyber threats in an ever-changing digital environment.
The report is based on global telemetry data from Palo Alto Networks Next-Generation Firewall (NGFW), Cortex Data Lake, Advanced URL Filtering and Advanced WildFire.