{"id":8862,"date":"2022-06-21T18:51:18","date_gmt":"2022-06-21T18:51:18","guid":{"rendered":"https:\/\/www.ecsoffice.com\/?p=8862"},"modified":"2022-06-29T16:57:05","modified_gmt":"2022-06-29T16:57:05","slug":"businesses-become-more-secure","status":"publish","type":"post","link":"https:\/\/www.ecsoffice.com\/businesses-become-more-secure\/","title":{"rendered":"Over 2.5 million businesses worldwide have become more secure through early cyber security vulnerability assessments."},"content":{"rendered":"

In 2021 PT SWARM team (Positive Technologies\u2019 experts investigating security of all kinds of systems and devices) helped to fix over fifty critical vulnerabilities<\/strong> in the products of the largest world manufacturers, which are in demand worldwide, including in the industries that are critical for different states.<\/p>\n

Some vulnerabilities identified and closed include CVE-2021-21972 in VMware vCenter Server,<\/strong> CVE-2021-20026 in SonicWall NSM<\/strong>, CVE-2021-1497 in Cisco HyperFlex HX<\/strong>, CVE-2021-1445 in Cisco ASA<\/strong>, and CVE-2021-34414 in Zoom<\/strong>.<\/p>\n

Nearly 40% of all vulnerabilities identified and closed<\/strong> in 2021 with PT SWARM had an eminent threat level (greater than 7.0 on the CVSS scale).<\/p>\n

Separate attention during the year was paid by the PT SWARM team to examining the security of the information protection tools themselves: 12.5% of all the vulnerabilities were found in the software<\/strong>, designed to provide protection from hacker attacks.<\/p>\n

Ultimately, the work of the PT SWARM team reduced the potential for a successful attack for over 2.5 million companies around the world.<\/p>\n

While vendors ponder whether to close vulnerabilities, attackers exploit them<\/h2>\n

The trend toward a hybrid mode of operation for large companies and the increased demand for remote connectivity systems have illustrated the role of exploitation of inclosed vulnerabilities<\/strong> in such systems by attackers. Here, two things come into play.<\/p>\n

The first one has to do with the timeframe for data vulnerability<\/strong> closure: the experience of Positive Technologies shows vulnerabilities can be closed by vendors in a year (for example, of all vulnerabilities identified and sent to vendors in 2021 less than half – 47% – were fixed).<\/p>\n

While exploitation of such a cyber vulnerability in business<\/strong> by an attacker allows to penetrate an organization\u2019s perimeter in a matter of minutes.<\/p>\n

The second point concerns how seldom vendors announce public commercial programs to search for vulnerabilities in their products – at large Bug Bounty sites, they counted such projects in single figures (if we are not talking about searching for vulnerabilities in web applications).<\/p>\n

Private vendors often ignore private efforts to find vulnerabilities<\/strong>, while on the black market vulnerabilities are bought and sold.<\/p>\n

Changing the relationship between private researchers and vendors could probably change the ratio of demand and purchase of vulnerabilities in the black market.<\/p>\n

Predictions for 2022: A New Reality<\/h2>\n

Today, researchers are shaping new scenarios for notifying vendors and their customers of problems.<\/p>\n

Particularly when vulnerabilities are not reported to MITRE2<\/strong>, researchers report the vulnerabilities they find to international CERTs so that the information about the problem reaches the end user – the companies at risk.<\/p>\n

Some put their expertise directly into defenses. PT SWARM, in particular, cooperates with the development teams of Positive Technologies and supplements the expertise of the company\u2019s products with data about one or another cyber vulnerability<\/strong>.<\/p>\n

The average time to deliver such expertise to customers using the company\u2019s products in 2021 was several hours (sometimes up to an hour) from the moment the vulnerability information became public.<\/p>\n

The trend toward such self-organized, ethical sharing of vulnerability data<\/strong> is likely to gain momentum over the next year or two.<\/p>\n

In 2022, attackers will continue to hunt for zero-day vulnerabilities, adopting new exploits and information about discovered security flaws.<\/p>\n

This creates a kind of \u201crace\u201d: who will discover cyber vulnerability assessment first<\/strong> – the researcher or the criminal, what will be published first – the exploit or the patch, what will companies choose – install the patch as quickly as possible or get hacked and pay the ransom.<\/p>\n

Therefore, to win this race, software developers need to test their products for security, including through BugBounty programs.<\/p>\n

After all, as long as more people pay for vulnerabilities in the darkweb<\/strong> and more willingly than the developers themselves, it will be the darkweb that will receive information about new data vulnerabilities.<\/p>\n

If you care about your business – schedule free consultation to learn about the full range of cybersecurity services<\/a> that can protect your company.<\/p>\n","protected":false},"excerpt":{"rendered":"

In 2021 PT SWARM team (Positive Technologies\u2019 experts investigating security of all kinds of systems and devices) helped to fix over fifty critical vulnerabilities in the products of the largest world manufacturers, which are in demand worldwide, including in the industries that are critical for different states. Some vulnerabilities identified and closed include CVE-2021-21972 in […]<\/p>\n","protected":false},"author":3,"featured_media":8864,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[35,13,12],"tags":[],"_links":{"self":[{"href":"https:\/\/www.ecsoffice.com\/wp-json\/wp\/v2\/posts\/8862"}],"collection":[{"href":"https:\/\/www.ecsoffice.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ecsoffice.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ecsoffice.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ecsoffice.com\/wp-json\/wp\/v2\/comments?post=8862"}],"version-history":[{"count":29,"href":"https:\/\/www.ecsoffice.com\/wp-json\/wp\/v2\/posts\/8862\/revisions"}],"predecessor-version":[{"id":8958,"href":"https:\/\/www.ecsoffice.com\/wp-json\/wp\/v2\/posts\/8862\/revisions\/8958"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ecsoffice.com\/wp-json\/wp\/v2\/media\/8864"}],"wp:attachment":[{"href":"https:\/\/www.ecsoffice.com\/wp-json\/wp\/v2\/media?parent=8862"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ecsoffice.com\/wp-json\/wp\/v2\/categories?post=8862"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ecsoffice.com\/wp-json\/wp\/v2\/tags?post=8862"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}