HomeNewsIndia NewsNew Vulnerabilities Soar, OT Attacks on the Rise and Cryptominers Reign Supreme,...

    New Vulnerabilities Soar, OT Attacks on the Rise and Cryptominers Reign Supreme, According to Report

    Skybox Security, a global leader in cybersecurity management, announced the release of its latest Vulnerability and Threat Trends Report which analyzes the vulnerabilities, exploits and threats in play over the previous year. The report, compiled by the team of security analysts at the Skybox Research Lab, aims to help organizations align their security strategy with the reality of the current threat landscape.

    What stands out first from the data is the sheer volume of new vulnerabilities published in 2018. The National Vulnerability Database (NVD) assigned 16,412 new CVEs, a 12-percent increase over the previous year. That may seem like a small climb, but the 2017 figure was already an all-time high, and Skybox Director of Threat Intelligence Marina Kidron believes these record-breaking figures are the new normal.

    Ron Davidson, Skybox CTO and Vice President of R&D, echoed a similar sentiment: “If you’re hanging your vulnerability management strategy on fixing CVSS critical- or high-severity vulnerabilities, 2018 added about 9,000 vulnerabilities to that list; it’s simply no longer practical to ‘focus’ attention on this large group. Exploitability, what’s being used in the wild, what sample code is available, is a more important indicator of what should get attention first. It’s something many vulnerability management programs lack, so their resources are going in the wrong place and they’re not moving the needle on risk.”

    Other findings of the report include risks to the growing attack surface, including operational technology (OT) networks. Attacks on OT continue to climb with a 10-percent increase between 2017 and 2018. While these attacks range in motive and impact, the WannaCry outbreak in Taiwan Semiconductor Manufacturing Company was a prime example of how a cybercriminal tool like ransomware, nation-state threats and internal exposure can create the perfect storm to wreak havoc on a network, as well as a company’s bottom line.

    The report also warns of a false sense of security in cloud networks. While the security of clouds is relatively strong, misconfiguration issues within them can still abound and security issues can arise within the applications used to manage such networks.

    “While cryptomining may seem like a relatively innocuous, low-priority threat, it’s important to remember that these attacks slow down system processes and may overwhelm system capacity,” said Skybox Senior Security Analyst Sivan Nir.“More than that, it’s impossible to predict what the attacker’s end goal may be. The cryptominer may be only part of a larger attack structure. By letting them set up home in your network, you’re inviting them to try to gain access to other parts of your environment.”

    Whether protecting against cryptominers, threats to the OT network or simply trying to keep up with what vulnerability to fix next, incorporating threat intelligence in vulnerability management programs will give organizations the edge they need to counter a dynamic threat landscape.

    For more information, visit: www.skyboxsecurity.com

    ELE Times Research Desk
    ELE Times Research Deskhttps://www.eletimes.ai
    ELE Times provides a comprehensive global coverage of Electronics, Technology and the Market. In addition to providing in depth articles, ELE Times attracts the industry’s largest, qualified and highly engaged audiences, who appreciate our timely, relevant content and popular formats. ELE Times helps you build awareness, drive traffic, communicate your offerings to right audience, generate leads and sell your products better.

    Related News

    Must Read

    Adoption of Electric Motorcycles: A Challenging Ride Ahead

    India’s tryst with electric two-wheelers began as early as...

    Edge AI Chipsets: How On-Device Intelligence Is Reshaping Embedded System Design

    The cloud-first model for embedded systems is becoming a...

    Quantum-Safe Hardware: Why the Cybersecurity Deadline Is Closer Than the Quantum Breakthrough

    The world’s digital infrastructure is quietly approaching a cryptographic...

    SQL Server IoT 2025: Why It Matters for Embedded and OEM Systems

    Courtesy: Arrow Electronics The new SQL Server IoT 2025 is...

    Microchip Releases Plastic Transient Voltage Suppressors for A&D Applications

    Microchip Technology announced the release of its JANPTX family...

    Týr-the-Pruner: Search-based Global Structural Pruning for LLMs

    Courtesy: AMD Key Takeaways: End-to-end global structural pruning: Týr-the-Pruner...

    Global Semiconductor Revenue Grew 21% in 2025, reports Gartner

    Worldwide semiconductor revenue totalled $793 billion in 2025, an...

    India aims to be among the major semiconductor hubs by 2032, says Union Minister Ashwini Vaishnaw

    India has joined the global race to manufacture semiconductor...

    AI Glasses: Ushering in the Next Generation of Advanced Wearable Technology

    Courtesy: NXP Semiconductors   AI integration into wearable technology is...

    The semiconductor technology shaping the autonomous driving experience

    Courtesy: Texas Instruments Last summer in Italy, I held...