Chaining Exploits are Taking Vulnerabilities to a New Level
Cyberattacks are leaping ahead in sophistication and the industry is not prepared.
As an example, Google Project Zero team recently detected attackers that exploited a combination of seven previously unknown vulnerabilities (0-days) to hack fully patched Windows, Android, and IOS
systems.
In this week’s video I cover the rapid advances of attackers, the strategic implications, and some areas in which the industry must adapt.
The cybersecurity industry must actively keep pace with the advancing capability of attackers.
Interested in more cybersecurity insights, rants, and strategic viewpoints?
- Subscribe to the Cybersecurity Insights channel on YouTube: https://www.youtube.com/c/CybersecurityInsights
Follow me on:
- LinkedIn: https://www.linkedin.com/today/author/matthewrosenquist
- Medium: https://medium.com/@matthew.rosenquist
- Twitter (@Matt_Rosenquist): https://twitter.com/Matt_Rosenquist
Posted with STEMGeeks
0
0
0.000
Eleven 0-day vulnerabilities! How is that even possible?
There could be multiple hackers in your system right now, without you knowing! If a zero days exploit is used, the criminal (or three letter government agency) would like to stay there as long as possible, they accomplish this by stealing as little amount of info/money that you dont notice. The moment you notice something is wrong, its game over for them.
The stealth possibilities of 0-Day exploits make them very dangerous!