Just In
- 43 min ago
- 3 hrs ago
- 16 hrs ago
- 21 hrs ago
Don't Miss
- Finance
3 Stocks With Low P/E, Solid Fundamentals & Robust Dividend Yields
- News
Former cricketer Vinod Kambli booked for ‘verbally abusing, thrashing’ wife while ‘drunk’
- Lifestyle
What Makes Children Picky Eaters? Tips For Parents To Handle Them
- Movies
Entertainment LIVE Updates: Sidharth-Kiara’s Sangeet & Mehendi Ceremony Today, Bigg Boss 16 Last Ration Task
- Sports
Davis Cup: India relegated to World Group II after losing Play-off 2-3 to Denmark
- Automobiles
Maruti Suzuki Fronx Reaches Nexa Showrooms – More Than 5,500 Bookings Bagged
- Travel
Happily Single? Solo Trip Options To Explore Self Love This Valentine
- Education
Now, online common entrance exam first for Agniveer recruitment process by Army
Here’s How Hackers Are Exploiting New Vulnerabilities Within Minutes
Cyber attacks are at an all-time high, and hackers have become more efficient than ever. Attackers are capable of moving faster than anyone when speaking of scanning vulnerability announcements from software publishers. They can scan for vulnerabilities in just 15 minutes once they are announced, according to Palo Alto’s 2022 Unit 42 Incident Response Report.

As per a report from Bleeping Computer, hackers constantly check software vendor bulletin boards where vulnerabilities are announced in the form of CVEs. It enables attackers to exploit these details and infiltrate an organization’s network. It also allows them to spread malicious code remotely.
Patching Loopholes Before Hackers Find Them
“The 2022 Attack Surface Management Threat Report found that attackers typically start scanning for vulnerabilities within 15 minutes of a CVE being announced,” Palo Alto’s Unit 42’s blog post reads.
With hackers spreading their roots in every nook and corner of the internet and becoming faster than ever, it takes them only a few minutes to spot weak targets. Their job gets easier if they have a report that details the vulnerability.
In simple words, system admins will be required to boost their process of identifying security loopholes and patch them before cyber attackers find a way to exploit these loopholes.
Amateur Hackers Can Also Be Dangerous
The report also sheds light on how scanning doesn’t need a hacker to have highly-sophisticated skills to cause damage. Anyone with a basic understanding of scanning CVEs can search on the internet and disclose vulnerable endpoints. They can sell this information on the dark web to people who know how to use that information to their benefit.
Unit 42’s report highlighted CVE-2022-1388, an unauthenticated command execution vulnerability that was causing problems to F5 BIG-IP products. Just within 10 hours of its announcement, around 2,500 scanning and exploitation attempts were made by hackers.
Cyber attacks involving malware and hackers have grown multifold in the past few months. Hacker groups and individual threat actors have managed to plant malicious code onto motherboards that can be hard to detect and remove.
-
1,39,900
-
89,900
-
61,999
-
62,999
-
84,999
-
82,999
-
59,400
-
1,09,999
-
59,999
-
79,999
-
65,900
-
13,999
-
6,499
-
13,499
-
11,999
-
1,29,900
-
17,990
-
17,999
-
7,332
-
13,999
-
29,752
-
17,735
-
11,500
-
8,876
-
8,990
-
4,570
-
21,999
-
20,450
-
17,999
-
9,999