Threat Trend Awareness – Living on the Edge (of the Network Perimeter)
Created: Tuesday, June 18, 2024 - 20:34
Categories:
From ransomware groups to state-sponsored actors, multiple cyber threat actor types are exploiting vulnerabilities on edge devices, remote services, and other components that are exposed at the network edge (that shouldn’t be). Edge devices should be considered among the critical assets of any organization and the security of such devices should be one of the highest priorities. Approximately 19% of the CISA KEV consists of vulnerabilities in network edge devices or security gateways, about half of which were disclosed (and exploited) since 2020 onward. As always, members are encouraged to update, compensate, or isolate. But ignoring vulnerabilities is not an option
From ransomware groups to state-sponsored actors, multiple cyber threat actor types are exploiting vulnerabilities on edge devices, remote services, and other components that are exposed at the network edge (that shouldn’t be). Edge devices should be considered among the critical assets of any organization and the security of such devices should be one of the highest priorities. Approximately 19% of the CISA KEV consists of vulnerabilities in network edge devices or security gateways, about half of which were disclosed (and exploited) since 2020 onward. As always, members are encouraged to update, compensate, or isolate. But ignoring vulnerabilities is not an option
