• My Account
  • Shop
  • Cart

Cyber Bunee

  • Home
  • News
    • artificial intelligence
    • cyber-security
    • hacking attacks
    • software dev
    • automation
    • certifications
    • Videos
      • Youtube Videos
    • Resources

    Report Reveals Three-fold Increase in New Vulnerabilities Over a Decade – Cybersecurity Threats on the Rise

    bunee 07 Jun 2023

    Report shows three-fold increase in new vulnerabilities over a decade

    Main Points:

    • New vulnerabilities discovered each year have tripled over the past ten years, according to RiskBased Security’s 2019 report.
    • The total number of vulnerabilities reported in 2019 was 22,316, a 17 percent increase from 2018.
    • Software vulnerabilities accounted for 55 percent of the total, while hardware and firmware vulnerabilities accounted for 15 percent.
    • Threat actors are taking advantage of the increasing number of vulnerabilities to carry out cyber attacks.

    The Details:

    Cybersecurity researchers have discovered that the number of new vulnerabilities is on the rise, with the volume of new vulnerabilities discovered each year tripling over the past decade. This was highlighted in RiskBased Security’s 2019 report, which revealed that a total of 22,316 vulnerabilities were reported in 2019, which is a 17 percent rise from the previous year.

    The report also shows that out of the total vulnerabilities reported, 55 percent were software related, with 15 percent being hardware and firmware related. This implies that cyber attacks targeting specific software and technology have increased in recent years.

    Security experts warn that threat actors are increasingly exploiting these vulnerabilities to launch cyber attacks, and organizations are struggling to keep up with the pace of discovery. The results can be catastrophic, with companies losing millions of dollars in just one attack.

    Conclusion:

    The fact that new vulnerabilities are being discovered at an increasingly rapid pace highlights the need for organizations to prioritize cybersecurity. Investing in preventative measures, such as regular penetration testing and vulnerability assessments, is key to combatting cyber threats and protecting sensitive data. Stay vigilant, stay protected.

    Original Article: https://www.infosecurity-magazine.com/news/cves-surge-25-2022-another-record/

    2023-06-07
    Facebook Twitter linkedin Pinterest WhatsAppt Telegram Email More
    Previous Article :

    The PowerDrop Malware: A New Threat to the U.S. Aerospace Industry

    Next Article :

    The Dangers of Deepfake Technology: Fake Imagery Used in Harassment and Extortion Schemes

    Similiar

    BlackBerry President Calls for Government Intervention in AI Risks

    BlackBerry President Calls for Government Intervention in AI Risks

    How Law Firms Can Protect Against Cyberattacks

    How Law Firms Can Protect Against Cyberattacks

    Why Universities are Common Targets for Ransomware Attacks

    Why Universities are Common Targets for Ransomware Attacks

    Leave a Reply Cancel reply

    Your email address will not be published. Required fields are marked *

    See Also...

    BlackBerry President Calls for Government Intervention in AI Risks

    BlackBerry President Calls for Government Intervention in AI Risks

    BlackBerry President John Giamatteo Advocates for Government Intervention in AI Risks Introduction In an interview ...

    Latest News

    Innovating in Real Estate: Technology Landlords Can Use to Increase Profits and Make Management Easier
    news

    Innovating in Real Estate: Technology Landlords Can Use to Increase Profits and Make Management Easier

    bunee 02 Oct 2023
    And We’re Back!…
    news

    And We’re Back!…

    bunee 04 Jun 2023

    Tech Reviews

    Artificial Intelligence Takes Over Journalism: The Rise and Implications of AI-Generated Content in the Digital Age
    tech review

    Artificial Intelligence Takes Over Journalism: The Rise and Implications of AI-Generated Content in the Digital Age

    bunee 20 Jun 2023
    Tips and Gear to Stay Cool This Summer: Beat the Heat with These Simple Hacks
    tech review

    Tips and Gear to Stay Cool This Summer: Beat the Heat with These Simple Hacks

    bunee 20 Jun 2023
    The Importance of Technology Training for Government Employees
    tech review

    The Importance of Technology Training for Government Employees

    bunee 20 Jun 2023
    Choosing the Right Apple Laptop: A Guide for Budget and Professional Users
    tech review

    Choosing the Right Apple Laptop: A Guide for Budget and Professional Users

    bunee 20 Jun 2023
    “Oppenheimer Director Says AI is No More Dangerous Than Any Other Technology, but his New Movie Will Still Leave You Terrified”
    tech review

    “Oppenheimer Director Says AI is No More Dangerous Than Any Other Technology, but his New Movie Will Still Leave You Terrified”

    bunee 20 Jun 2023
    “US Counties Struggle with Severe Ob-Gyn Shortage: Post-Roe Laws Undermining Training Opportunities”
    tech review

    “US Counties Struggle with Severe Ob-Gyn Shortage: Post-Roe Laws Undermining Training Opportunities”

    bunee 20 Jun 2023
    Google’s Android Slate: The Ultimate Entertainment Hub and Smart Home Controller
    tech review

    Google’s Android Slate: The Ultimate Entertainment Hub and Smart Home Controller

    bunee 20 Jun 2023
    • Home
    • News
      • artificial intelligence
      • cyber-security
      • hacking attacks
      • software dev
      • automation
      • certifications
    • Videos
      • Youtube Videos
    • Resources

    Follow Us

    Popular Videos

    Newsletter

    Popular News

    • 1

      And We’re Back!…

    • 2

      New Magecart Campaign: Multiple Cybercrime Groups Operating Simultaneously

    • 3

      Major UK Organizations Suffer Data Breaches: Boots, British Airways, and the BBC Among Those Affected

    • 4

      Verizon Report: Human Error a Top Cause of Cybersecurity Incidents in 2019

    • 5

      Tech Firm Mitigates Ransomware Attack: Tips for Protection

    Fellow Sponsors

    Tags

    attacks break into cyber coinbase crypto hacking how to ransomware real estate technology updates
    (▀̿Ĺ̯▀̿ ̿) Copyright , All Rights Reserved
    Website courtesy of Lucid Perspective