Organisations Urged to Act Quickly as Cybercriminals Plan Attack in Six Days, Says Positive Technologies

Published:

spot_img

Positive Technologies Warn Organizations of Impending Cybersecurity Threat

Positive Technologies has issued a warning to organisations, stating they have just six days until cybercriminals potentially strike. A recent study by Positive Technologies revealed that vulnerability exploitation has been one of the top three most popular attack methods on organisations for the past five years. In fact, in 2022-2023, over 2,700 companies worldwide had their confidential data stolen by attackers exploiting just one vulnerability.

According to Fedor Chunizhekov, Head of Security Analytics at Positive Technologies, cybercriminals are increasingly attracted to vulnerability exploitation, with about one-third of all successful cyberattacks being attributed to this method. On average, an experimental exploit becomes available within six days of a critical vulnerability disclosure, leading to discussions on dark web forums and the development of ready-to-use exploits for mass attacks.

The study also highlighted commonly mentioned vulnerabilities in popular products such as WinRAR, Fortinet, and the Java-based Spring Framework. Messages discussing remotely exploited vulnerabilities make up 70% of cybercriminal discussions on the dark web.

Delaying vulnerability fixes can have serious consequences for organisations, as evidenced by previous incidents where data was stolen, websites were defaced, and ransomware attacks occurred due to exploitation of vulnerabilities.

To prevent the exploitation of vulnerabilities and potential cyberattacks, experts recommend that organisations regularly inventory and classify their assets, prioritize assets based on importance and vulnerability severity, conduct security analyses, and closely monitor the dark web for threats. It is crucial for organisations to set realistic timelines for vulnerability remediation and closely monitor the patching process to ensure their IT infrastructure remains secure.

spot_img

Related articles

Recent articles

₹60 Crore Cyber Fraud Network Uncovered in Deoria: Key Accused Arrested Amid Nationwide Investigation

₹60 Crore Cyber Fraud Network Uncovered in Deoria: Key Accused Arrested Amid Nationwide Investigation A significant cyber fraud operation involving mule accounts and suspicious transactions...

China-Linked TA416 Accelerates Cyber Attacks on European Governments Using PlugX and OAuth Phishing Techniques

China-Linked TA416 Accelerates Cyber Attacks on European Governments Using PlugX and OAuth Phishing Techniques A notable resurgence in cyber espionage has emerged from a China-aligned...

ICONSIAM’s ‘THAICONIC SONGKRAN CELEBRATION 2026’ Strengthens Thailand’s Cultural Heritage with Unforgettable Riverside Experiences

ICONSIAM’s THAICONIC SONGKRAN CELEBRATION 2026 Strengthens Thailand’s Cultural Heritage with Unforgettable Riverside Experiences BANGKOK, THAILAND - From April 10 to 15, 2026, ICONSIAM, a prominent...

Everpure Advances Portworx Enterprise to Accelerate Modern Virtualization for Enterprise VMs and Containers

Everpure Advances Portworx Enterprise to Accelerate Modern Virtualization for Enterprise VMs and Containers Everpure has unveiled significant enhancements to Portworx Enterprise, aimed at organizations managing...