• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
researchers disclose top vulnerabilities abused by ransomware gangs

Researchers disclose top vulnerabilities abused by ransomware gangs

You are here: Home / General Cyber Security News / Researchers disclose top vulnerabilities abused by ransomware gangs
September 20, 2021

Shutterstock

Security scientists have well prepared a checklist of flaws frequently employed by cyber criminal offense gangs in ransomware attacks to infiltrate victim’s networks.

Past weekend, Allan Liska, a member of Recorded Future’s CSIRT, tweeted the contact to action to fellow security gurus. He asked his followers to mail in the vulnerabilities they often see used to attain entry to networks.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


In the house of day, a variety of contributors stated security flaws uncovered in quite a few products and solutions from hardware and software vendors. Pancek3, one more researcher on Twitter, produced and afterwards tweeted out, a simple diagram of flaws usually made use of in ransomware attacks that should really enable companies to prioritize details of their infrastructure that need defending.

Among the the flaws used by ransomware attacks are ones observed in Pulse SecureVPN, Citrix, Microsoft Exchange, Fortinet, and SonicWall, to title a number of.

Liska and others’ efforts above the final several days occur just after different government and personal organization initiatives to fend off the rising surge in ransomware attacks.

Past month, CISA, Microsoft, Google Cloud, and AWS, released a Joint Cyber Defense Collaborative (JCDC), to guard critical infrastructure in opposition to ransomware. 

Previously this yr, CISA published a new module for its Cyber Security Evaluation Instrument (CSET) to help companies to evaluate their security posture concerning ransomware attacks.

Eoin Keary, CEO, and founder at Edgescan advised ITPro that what is critical to note is a significant quantity of the vulnerabilities are two to three decades aged. 

“Industrialized cyber criminal offense is not leveraging ‘Zero Day’ payloads or exploits, but relatively focusing on the ‘old reliables.’ This provides me to the conclusion that we have a lot of get the job done to do in conditions of each ongoing visibility, vulnerability detection and mitigation of found vulnerabilities, such as fantastic patching cadence. The days of singular level-in-time penetration exams are around, and companies need to have to move to a more continual product,” he reported

Keary additional, “many ransomware attacks start off with a human-led breach followed by pivoting throughout the network and exploitation. It is also required to focus on ‘internal’ or non-public cyber security postures.” 

“Prevention is important, but we also want more focus on resilience.” He ongoing, “Resilience can imply fantastic vulnerability management, network segmentation, monitoring, and visibility as a get started. In addition, basic things to do like recurrent backups can lessen the impact of a successful ransomware attack.” 


Some pieces of this short article are sourced from:
www.itpro.co.uk

Previous Post: «europol busts major crime ring, arrests over 100 online fraudsters Europol Busts Major Crime Ring, Arrests Over 100 Online Fraudsters
Next Post: Modernise endpoint protection and leave your legacy challenges behind modernise endpoint protection and leave your legacy challenges behind»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections

Copyright © TheCyberSecurity.News, All Rights Reserved.