Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Cyber Security Risks Report Contains Few Surprises

Qualys today announced the release of the second annual “Top Cyber Security Risks Report.” featuring new data from HP TippingPoint DVLabs, SANS Institute and Qualys Research Labs, plus a “deep dive” analysis of PDF attacks, one of the fastest-growing classes of exploits now in play.

Qualys’s data on patching status for vulnerabilities alone is derived from more than 13 million scans each week.

Qualys today announced the release of the second annual “Top Cyber Security Risks Report.” featuring new data from HP TippingPoint DVLabs, SANS Institute and Qualys Research Labs, plus a “deep dive” analysis of PDF attacks, one of the fastest-growing classes of exploits now in play.

Qualys’s data on patching status for vulnerabilities alone is derived from more than 13 million scans each week.

The report contains no major surprises, but rather documents in a thorough manner many of the trends that have been cited in the technical press over the past two years.

• Enterprise computing is becoming increasingly “consumerized.” Some of the most serious security issues this year have stemmed from increased use of consumer technologies in the enterprise, including downloads of applications and use of social media tools on company computers.

• Attacks on web applications have substantially increased, while conventional attacks against operating systems continue to decline. Once exception to this decline is the rise of cross site request forgeries.

• Servers are by far the preferred targets of attack. Attacks against servers outnumber those against clients 50 to 1.

• The sophistication of attacks has increased across all attack types, including malicious JavaScript as well as server-side attacks like PHP file attacks.

• Legacy threats linger. Well-known and documented malware such as SQL Slammer is still prevalent.

Advertisement. Scroll to continue reading.

• The number of unpatched vulnerabilities has increased dramatically, and now often runs into the hundreds per product.

The report details the sophistication of many new attacks. One example is a technique that involves the loading of a number of innocuous JavaScript fragments into a site. None of them are malicious in themselves, but when all are loaded, they assemble themselves into a malicious entity. In its typically under-stated tone, the report concludes that “simple pattern, or signature-based, detection techniques commonly associated with anti-virus solutions, will no longer be effective on their own.”

In addition to statistics and summaries of trends, the report also contains an in-depth analysis of a PDF attack, down to the level of the code itself.

Most Popular Vulnerabilities

The complete 2010 “Top Cyber Security Risks Report” is available at http://dvlabs.tippingpoint.com/toprisks2010

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.