Top cybercrime weapon: Web exploit toolkits
Posted on 04 April 2011.
HP identified a significant increase in the volume of organized cybercrime targeting data centers and networks, which can lead to financial and data loss.


While there were more attacks recorded in 2010, the number of discovered vulnerabilities remained relatively stable, but high.

The HP report indicates that while the majority of attacks are against known and patched security vulnerabilities, many high-profile attacks use new vulnerabilities before vendors issue fixes.

To combat both types of attacks, businesses and governments can reduce risk with improved security practices, such as keeping their security systems up to date and leveraging the research of the HP Digital Vaccine Labs' (DVLabs) Zero Day Initiative.

A key finding in the new report is the dramatic increase of web exploit toolkits. These “packaged” attack frameworks are traded online, enabling attackers to access enterprise IT systems and steal sensitive data. According to the report, web exploit toolkits are rapidly growing as the weapon of choice by attackers due to ease of use and high success rate.


Web application vulnerabilities represent half of all security vulnerabilities and continue to plague enterprises. The report identifies third-party plug-ins to content management systems as a leading cause of web application vulnerabilities. Blog-hosting and online discussion forum applications, such as Wordpress, Joomla and Drupal, are among the most frequently attacked systems.

“We’ve discovered that rather than investing resources to uncover new exploits, attackers are focused on current, unpatched vulnerabilities in web applications, social networking sites and Web 2.0 interfaces,” said Mike Dausin, manager, Advanced Security Intelligence, HP DVLabs. “HP TippingPoint, ArcSight and Fortify security solutions, coupled with HP’s experience in IT management and application life cycle management, offer clients protection from the latest attacks threatening to disrupt business continuity.”





Spotlight

USBdriveby: Compromising computers with a $20 microcontroller

Posted on 19 December 2014.  |  Security researcher Samy Kamkar has devised a fast and easy way to compromise an unlocked computer and open a backdoor on it: a simple and cheap ($20) pre-programmed Teensy microcontroller.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Dec 19th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //