
The latest findings from Unit 42's cybersecurity researchers are a prime example of the old adage, "The enemy never sleeps."
The Palo Alto Networks security arm recently released its latest Incident Response Report (opens in new tab)stating that threat actors are beginning to scour the web for vulnerable endpoints (opens in new tab) approximately 15 minutes after the CVE was publicly announced.
In other words, hackers keep a close eye on software vendors' bulletin boards, and as soon as one of them publicly announces that they've found a vulnerability, they rush to see where an exploit is possible.
attacks within hours
Scanning itself is not a threat, and knowing a vulnerability exists is one thing while actually exploiting it is another. However, crooks still perform these reconnaissance tasks because, if all else fails, they can sell the information on the black market, the researchers said.
Some of them move fast too - Unit 42 says that "within hours" the first active exploitation...
[ad_2]
Source link https://vmvirtualmachine.com/hackers-start-looking-for-vulnerabilities-15-minutes-after-disclosure/?feed_id=65701&_unique_id=62e132dfc2df8
No comments:
Post a Comment