IT vulnerabilities are on the rise, but Tenable helps you identify them

Vulnerabilities are growing in the market and some remain in companies for up to five years without being remi.
In an effort to learn more about the progress of cybersecurity in the market, Tenable present its 2022 Vulnerabilities Report .

Among the findings, it is worth highlighting the fact that cyberattacks take advantage of known vulnerabilities that have persist in environments for up to five years without anyone remying them.

According to Javier Salazar, the company’s channel manager in Mexico, the bulk of report attacks take advantage of these vulnerabilities.

That put companies at risk and

are not so difficult to remy.

Vulnerabilities are the entry point for cybercriminals into an organization; once inside, different types of attacks are execut, including ransomware .

The new report identifi 25,000 new vulnerabilities, a figure that has increas since 21,000 appear in 2021 and 18,000 in 2020.

As for ransomware, the main type of attack report in 2022, it was generat in 60% of cases by vulnerabilities .

The executive not that the number of attacks increas by 18% in Latin America, making the region the most attack globally.

Mexico is the second country brazil whatsapp number data with the highest number of ransomware attacks .

The report found that the government is the main target of criminals in the region, with 57% of the report attacks; follow by retail, which report 10%, and ucation, with 7.5%.

whatsapp data

The most recurrent attacks in the public sector are: Ransomware , information leaks and data breaches.

What is a vulnerability?
Salazar distinguishes two types of vulnerabilities , the first is software, which involves defects in computer programs.

For which manufacturers release

patches and updates in this type of ad that the user must install; however, this is not always done.

Another cause of vulnerability is poorly configur environments, either because the bw lists cloud itself is thought to be secure or because access is not taken care of.

 

Scroll to Top