Report at a Glance 20,000€¦ · threats in play so far this year, revealing how COVID-19 has...

1
New OT advisories increase Attacks on critical infrastructure have increased during the COVID-19 crisis: a 14% increase in new OT flaws serves as a reminder of how exposed OT environments have become. New ransomware and trojan samples soar Criminals have seen opportunity in COVID-19 and have been using ransomware to target critical infrastructure, including research labs and healthcare companies. 2020 will break new vulnerabilities record With 20,000 new vulnerabilities expected this year, security leaders’ workloads will increase at a time when they are focused on maintaining business continuity. 20,000 New vulnerabilities expected in 2020 – shattering previous records 72% Increase in new ransomware samples 50% increase in mobile vulnerabilities The 2020 Threat Landscape The mid-year update to the 2020 Vulnerability and Threat Trends Report analyzes the vulnerabilities, exploits and threats in play so far this year, revealing how COVID-19 has increased complexities. 110% New Android vulnerabilities A large increase in new Android flaws pushed total new mobile vulnerabilities up 50% – at a time when a mass remote workforce blurs the line between personal and corporate devices. Resources: Report: Mid-year Update to the Vulnerability and Threat Trends Report 2020 Whitepaper: Risk-Based Vulnerability Management www.skyboxsecurity.com Report at a Glance Top 5 Malware Types 2020 Share of new samples created in 2020 Ransomware 26% Trojans 23% Botnets 21% Backdoors 15% Remote Access Trojans 15% The report explains the current state of play for external threats. To understand internal threat context, you need to correlate vast and varied intelligence sources from within your infrastructure. It is only then that you will be able to navigate the challenges thrown up by the COVID-19 crisis while managing a record-breaking number of new vulnerabilities. Chaos Needs Context 0 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2017 2018 2019 2020 2013 2014 2015 2016 5000 10000 15000 20000 25000 CVEs Allocated Newcomers to most vulnerable products list Flaws in Edge Chromium and iPadOS – two products used in both personal and corporate environments – highlight how far the network perimeter has widened. 0 50 100 150 200 250 300 350 400 450 500 Ten Most Vulnerable Products New Vulnerabilities Google Android Microsoft Windows Google Chrome Apple MacOS X Apple iOS IBM API Connect Microsoft Edge Chromium Apple iPadOS Red Hat Openshift Oracle E-Business Suite

Transcript of Report at a Glance 20,000€¦ · threats in play so far this year, revealing how COVID-19 has...

Page 1: Report at a Glance 20,000€¦ · threats in play so far this year, revealing how COVID-19 has increased complexities. 110% New Android vulnerabilities A large increase in new Android

New OT advisories increase

Attacks on critical infrastructure have increased during the COVID-19 crisis: a 14% increase in new OT flaws serves as a reminder of how exposed OT environments have become.

New ransomware and trojan samples soar

Criminals have seen opportunity in COVID-19 and have been using ransomware to target critical infrastructure, including research labs and healthcare companies.

2020 will break new vulnerabilities record

With 20,000 new vulnerabilities expected this year, security leaders’ workloads will increase at a time when they are focused on maintaining business continuity.

20,000New vulnerabilities expected in 2020 – shattering previous records

72%Increase in new ransomware samples

50%increase in mobile vulnerabilities

The 2020Threat Landscape

The mid-year update to the 2020 Vulnerability and Threat

Trends Report analyzes the vulnerabilities, exploits and

threats in play so far this year, revealing how COVID-19 has

increased complexities.

110%New Android vulnerabilities

A large increase in new Android flaws pushed total new mobile vulnerabilities up 50% – at a time when a mass remote workforce blurs the line between personal and corporate devices.

Resources:

Report: Mid-year Update to the Vulnerability and Threat Trends Report 2020Whitepaper: Risk-Based Vulnerability Management

www.skyboxsecurity.com

Report at a Glance

Top 5 Malware Types 2020Share of new samples created in 2020

Ransomware

26%

Trojans

23%

Botnets

21%

Backdoors

15%

Remote Access Trojans

15%

The report explains the current state of play for external threats. To understand internal threat context, you need to correlate vast and varied intelligence sources from within your infrastructure. It is only then that you will be able to navigate the challenges thrown up by the COVID-19 crisis while managing a record-breaking number of new vulnerabilities.

Chaos Needs Context

0

2000

2001

2002

2003

2004

2005

2006

2007

2008

2009

2010

2011

2012

2017

2018

2019

2020

2013

2014

2015

2016

5000

10000

15000

20000

25000

CVEs Allocated

Newcomers to most vulnerable products list

Flaws in Edge Chromium and iPadOS – two products used in both personal and corporate environments – highlight how far the network perimeter has widened.

0

50

100

150

200

250

300

350

400

450

500

Ten Most Vulnerable Products

New

Vu

lne

rab

ilit

ies

Google

And

roid

Micro

soft

Win

dows

Google

Chrom

eApple

Mac

OS X

Apple

iOS

IBM

API

Connec

t

Micro

soft

Edge

Chrom

ium

Apple

iPad

OS

Red H

at

Open

shift

Ora

cle

E-Bus

ines

s

Suite