Cyber security news for all

More

    Vulnerabilities And Threat Trend Reports Of Skybox Security

    Vulnerabilities in cloud containers increased by 45 percent compared to 2019 and even more compared to 2018. Less than one percent of the newly released vulnerabilities were exploited, and only ten percent developed a working exploit. In 2020, there is a trend towards deep vulnerabilities that pose threats to multiple products that use the same code. Only 15 percent of all malware attacks are carried out by malicious cryptomining software, which was the tool of choice for many cybercriminals. The resulting gap is now filled by ransomware and backdoors.

    Skybox Security, one of the world’s leading providers of cybersecurity management, recently announced the release of the half-year update of the vulnerability and threat trends report. This analyzes weaknesses, exploits and threats from the first half of the season. The report, created by a team of security analysts is designed to help organizations adapt their security strategy to the reality of the current threat landscape.

    Skybox Security

    A Successful Attack On A Container Can Have Far-Reaching Consequences

    So it’s no surprise that new vulnerabilities are emerging within cloud environments, according to the director of Skybox Security. The company experts are worried about attackers that start an exploit race as soon as a vulnerability is discovered. A successful attack on a container can have far-reaching consequences. Compared to other technologies, containers can be replicated in greater numbers and more quickly enlarge in a very short time and cause extremely high damage.

    Container Providers Are Keen To Secure Their Products From The Beginning

    However, this also means reporting vulnerabilities when they are identified. It is important for customers to be aware of these vulnerabilities, even if the environment is constantly changing. They must be able to evaluate the likelihood of attack and the associated consequences, together with them prioritize other vulnerabilities in the rest of the environment, including hybrid networks and virtual networks.

    Recent Articles

    macOS Trojans: Traces lead to Vietnam

    Security researchers have discovered a new macOS Trojans. Behind this could be a well known hacker group that has spied on Vietnamese dissidents in...

    Court forces Tutanota to perform a surveillance function

    Tutanota email only stores its user mails in encrypted form and cannot read them itself. Tutanota is one of the few email providers that...

    Manchester United have been blackmailed by cyber attackers

    The Premier League club Manchester UnitedĀ fell victim to a cyber attack according to the Daily Mail. The cyber criminals are apparently demanding ransom in...

    TikTok has fixed a serious security gap issue

    TikTok accounts paid a researcher a reward of 4000 dollars after he reported two vulnerabilities as part of a disclosure. A combination of both...

    Passwords should be changed for Fortinet VPNs

    Administrators should change the access for Fortinet VPNs in use. Log-in information for almost 50,000 VPN networks has appeared in various cyber blogs. A security...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox