I have decided to create a new timeline tracking the high-impact vulnerabilities targeting both remote access technologies and internet-facing servers, and exploited by cyber criminals to implant ransomware or, even worse, to accumulate compromised credentials to sell in the flourishing market of the initial access brokers.

I called it the perfect storm, since there might have been no worse period for these vulnerabilities to be exploited since, after the pandemic, remote access technologies such as VPN concentrators, are playing a fundamental role to let the distributed workforce access the internal resources, in many cases not conceived to be exposed directly in the internet.

Expand for details

Enjoy the interactive timeline, and thanks for sharing it, and supporting my work in spreading the risk awareness across the community. Also, don’t forget to follow @paulsparrows on Twitter, or even connect on Linkedin, for the latest updates.

BREACHES
POPULAR POSTS
  • 2023 Stats Featrured Image2024 Cyber Attacks Statistics

    In 2023, there was a 35% increase in cyber attacks to 4,128 events, with the MOVEit CVE-2023-34362 vulnerability being heavily exploited. Cybercrime dominated as the main motivation at 79%, while malware led attack techniques with 35.9%. Healthcare remained a top target for ransomware. The data ...

  • computer program language text1-15 January 2024 Cyber Attacks Timeline

    I am back with the first timeline of 2024, with some changes: ransomware counted as a specific attack technique, and an optimization of the sources. With this new methodology I collected 116 events, and for the first time, the threat landscape was dominated by account ...

  • The Biggest Data Breaches of 2021

    With this new project I am going to track the biggest data breaches of 2021 extracted from my cyber attack timelines.

  • Photo by Towfiqu barbhuiya on UnsplashThe Biggest Data Breaches of 2023

    Similarly to what I have done in 2022 and 2021, I am collecting the main mega breaches...

  • Leaky Buckets: a List of Cloud Misconfigurations

    Cloud services are playing a crucial role to guarantee business continuity during this complicated period...

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.