Report at a Glance 20,000€¦ · threats in play so far this year, revealing how COVID-19 has...
Transcript of Report at a Glance 20,000€¦ · threats in play so far this year, revealing how COVID-19 has...
New OT advisories increase
Attacks on critical infrastructure have increased during the COVID-19 crisis: a 14% increase in new OT flaws serves as a reminder of how exposed OT environments have become.
New ransomware and trojan samples soar
Criminals have seen opportunity in COVID-19 and have been using ransomware to target critical infrastructure, including research labs and healthcare companies.
2020 will break new vulnerabilities record
With 20,000 new vulnerabilities expected this year, security leaders’ workloads will increase at a time when they are focused on maintaining business continuity.
20,000New vulnerabilities expected in 2020 – shattering previous records
72%Increase in new ransomware samples
50%increase in mobile vulnerabilities
The 2020Threat Landscape
The mid-year update to the 2020 Vulnerability and Threat
Trends Report analyzes the vulnerabilities, exploits and
threats in play so far this year, revealing how COVID-19 has
increased complexities.
110%New Android vulnerabilities
A large increase in new Android flaws pushed total new mobile vulnerabilities up 50% – at a time when a mass remote workforce blurs the line between personal and corporate devices.
Resources:
Report: Mid-year Update to the Vulnerability and Threat Trends Report 2020Whitepaper: Risk-Based Vulnerability Management
www.skyboxsecurity.com
Report at a Glance
Top 5 Malware Types 2020Share of new samples created in 2020
Ransomware
26%
Trojans
23%
Botnets
21%
Backdoors
15%
Remote Access Trojans
15%
The report explains the current state of play for external threats. To understand internal threat context, you need to correlate vast and varied intelligence sources from within your infrastructure. It is only then that you will be able to navigate the challenges thrown up by the COVID-19 crisis while managing a record-breaking number of new vulnerabilities.
Chaos Needs Context
0
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2017
2018
2019
2020
2013
2014
2015
2016
5000
10000
15000
20000
25000
CVEs Allocated
Newcomers to most vulnerable products list
Flaws in Edge Chromium and iPadOS – two products used in both personal and corporate environments – highlight how far the network perimeter has widened.
0
50
100
150
200
250
300
350
400
450
500
Ten Most Vulnerable Products
New
Vu
lne
rab
ilit
ies
And
roid
Micro
soft
Win
dows
Chrom
eApple
Mac
OS X
Apple
iOS
IBM
API
Connec
t
Micro
soft
Edge
Chrom
ium
Apple
iPad
OS
Red H
at
Open
shift
Ora
cle
E-Bus
ines
s
Suite