- Trump taps Sriram Krishnan for AI advisor role amid strategic shift in tech policy
- 5 network automation startups to watch
- 4 Security Controls Keeping Up with the Evolution of IT Environments
- ICO Warns of Festive Mobile Phone Privacy Snafu
- La colaboración entre Seguridad y FinOps puede generar beneficios ocultos en la nube
Exploitation of Vulnerabilities Soared By 55% in 2022
The number of vulnerabilities exploited in 2022 has grown by 55% compared to 2021, shows a new report by Palo Alto Networks’ Unit 42.
The Network Threat Trends Research Report, volume 2, also suggests Linux malware emerged as a growing concern last year, particularly since 90% of public cloud instances are running on Linux.
The report identifies botnets as the most prevalent type of Linux threat, accounting for 47% of attacks, followed by coin miners at 21% and backdoors at 11%.
ChatGPT scams saw a 910% increase in monthly domain registrations, pointing to an exponential growth in fraudulent activities taking advantage of the widespread usage and popularity of AI-powered chatbots.
Cryptominer traffic has also experienced a doubling in 2022, indicating a growing financial motive behind cybercriminal activities.
Read more on similar attacks: US Regulators Warn Banks About Cryptocurrency Security Risks
According to the latest Unit 42 report, threat actors increasingly leverage newly registered domains (NRDs) to carry out their attacks. Researchers discovered that individuals visiting adult websites were the primary target, accounting for 20.2% of cases, followed by financial services sites at 13.9%.
In addition, the manufacturing, utilities, and energy industries have witnessed a significant surge in malware attacks, particularly those targeting operational technology (OT). The report highlights a staggering 238% increase in malware attacks experienced by organizations within these sectors between 2021 and 2022.
To defend against these growing threats, organizations must prioritize proactive measures to identify vulnerabilities and educate individuals about safe online practices.
By leveraging the insights provided in the Unit 42 report, organizations can take the necessary steps to fortify their defenses and mitigate the risks posed by cyber threats in an ever-changing digital environment.
The report is based on global telemetry data from Palo Alto Networks Next-Generation Firewall (NGFW), Cortex Data Lake, Advanced URL Filtering and Advanced WildFire.