Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Monday, 15 August, 2022
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

223 vulnerabilities identified in recent ransomware attacks

Researched found 223 different vulnerabilities used in ransomware attacks in 2020

by Jade
February 12, 2021
in Cyber Bites
Laptop
Share on FacebookShare on Twitter

Researches from RiskSense, a risk-based vulnerability management service, discovered 223 different vulnerabilities in the Common Vulnerabilities and Exposures (CVE) database that were used in ransomware attacks throughout 2020. This is four times the number of vulnerabilities related to ransomware than found in 2019 by RiskSense.

The findings also show that ransomware families are not only growing but they are also becoming more complex. The previous report from 2019 found that there were 19 separate ransomware families, but the 2020 report identified 125 different families. These ransomware groups are drastically expanding their operations, selling their tools to third parties, building new malware variants, and attacking flaws in web applications and software.

Natalie Page, Cyber Threat Intelligence Analyst from Sy4 Security, said that “in 2020, ransomware attacks not only grew drastically in numbers, but broke records for its reckless and damaging methods. We found that 30% of our own reporting from the Threat Intelligence team last year solely concerned ransomware, but for every report we produced regarding ransomware, we emulated with reports on emerging vulnerabilities”.

Stephen Kapp, CTO and Founder of Cortex Insight said, “ransomware, just like all the various flavours of malware before it is here to stay. This report is highlighting how important it is to ensure every security patch is implemented and that it is implemented quickly. Some of the reports oldest highlighted vulnerabilities were not in Operating Systems but third party applications. The more time passes by on these older vulnerabilities, the more likely someone will develop a usable exploit to be used in ransomware. So, it is ever more important to ensure that all security updates for all your software are applied as soon as possible, that includes your operating system, as well as first and third-party applications”.

 

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Warning: Increase in Web Shell Attacks

Next Post

Top 5 privacy-conscious social media platforms

Recent News

Doctor holding phone

Recovery From NHS Attack Could Take Weeks

August 12, 2022
Industry All-Stars Take Stage at International Cyber Expo’s Global Cyber Summit

Industry All-Stars Take Stage at International Cyber Expo’s Global Cyber Summit

August 12, 2022
Laptop, phone, hands

Campaign Launched to Stop People From Becoming Money Mules

August 11, 2022
MIRACL is One Cybersecurity Company to Watch in 2022

MIRACL is One Cybersecurity Company to Watch in 2022

August 10, 2022

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information