Exposure Management
1 Min

Threat Actors' Favorites: Top Vendor Products Targeted in 2023

Attackers strategically exploit weaknesses in popular and widely used software products requiring internet connectivity especially those from vendors with known security flaws. These vulnerabilities, ranging from minor to critical, provide entry points for diverse attackers – from nation-states to organized cybercriminals – who use both broad as well as targeted approaches.

Attackers target specific vendors and products with good reason. They focus on:

  • Popular Software : Products with large user bases become high-value targets for maximizing impact (e.g., operating systems, content management systems).
  • Internet-exposed software: Any software with necessary internet connectivity poses an increased risk.
  • Vendors with a history of security weaknesses: This underscores the vital need for vendors to prioritize security.

Once inside a network, attackers escalate their operations. They might use tools like web shells to maintain access or move throughout the network to compromise more systems. This emphasizes the paramount importance of proactive practices like continuous threat exposure management (CTEM) for proactive risk mitigation.

Threat Actors' Favorites: Top Vendor Products Targeted in 2023

Related posts

BLOG
Exposure Management

Email Security Controls: Levels of Security & Preventable Attack Scenarios

Over the last few weeks, we have received numerous support requests from our enterprise customers and had interactions with teams regarding early notification alerts sent from our side about their application servers' susceptibility to the HTTP 2 Rapid Reset DDoS attack. It was interesting to listen to the Blue team's stance and views on the shared responsibility aspect of DDoS mitigation. There is a widespread misbelief that any single-layer protection, whether at the ISP level or gateway, offers adequate defense against all types of DDoS attacks. Most large enterprises have multi-disciplinary, defense-in-depth practices in place to prevent such attacks. Nonetheless, it was notable that we were able to demonstrate the actual impact to customers with meaningful proof of concepts (POCs) despite the presence of many such security solutions. While the most favored and recommended method of remediation is the actual patching of the application server, there may be issues related to application compatibility or other factors that could delay this action. Therefore, it is crucial to verify the presence and effectiveness of security controls at various levels to establish a virtual patching defense for the affected application servers. A multi-layered DDoS defense strategy integrates measures from ISPs, WAFs/WAAPs, CDNs, ALBs, SLBs, and Application Servers to provide comprehensive protection

See NST Assure in action! Contact us for a Demo

email us : info@nstcyber.ai
Proactively predict, validate & mitigate risks