Report Highlights Rising Cyber Threats from External Vulnerabilities

Cyber Threat Intelligence Facts and Views

Key Points

  • Critical cyber threats often originate from third-party vendors and external sources, posing significant organizational risks.
  • Platforms like Apache, NGINX, and Microsoft IIS account for 34% of severe vulnerabilities in surveyed assets.
  • Protocols like TLS and HTTPS are linked to 15% of severe vulnerabilities. 60% of web interfaces handling PII lack WAF protection, leaving sensitive data vulnerable.
  • Organizations must move beyond outdated vulnerability management practices to safeguard against evolving external threats.

Critical vulnerabilities in digital systems expose organizations to significant security risks, especially as reliance on third-party software and complex supply chains grows. According to the 2024 State of External Exposure Management Report by CyCognito, some of the most dangerous vulnerabilities originate from external sources, highlighting the importance of proactive security measures.

ADVERTISEMENT
3rd party Ad. Not an offer or recommendation by techgolly.com.

The report emphasizes that third-party vendors play a pivotal role in business operations by providing essential software and hardware. However, they also introduce substantial risks due to misconfigurations and vulnerabilities within the supply chain. Prominent examples like the MOVEit Transfer flaw, Apache Log4J, and Polyfill demonstrate how third-party software often becomes the source of severe threats.

Web servers remain one of the most vulnerable assets in an organization’s IT infrastructure. CyCognito’s findings reveal that web server environments are responsible for 34% of all severe vulnerabilities across surveyed assets. Platforms such as Apache, NGINX, Microsoft IIS, and Google Web Server host more severe issues than 54 other environments combined, making them a critical focus area for cybersecurity efforts.

ADVERTISEMENT
3rd party Ad. Not an offer or recommendation by techgolly.com.

Cryptographic protocols, including Transport Layer Security (TLS) and HTTPS, pose significant risks. The report states that 15% of all severe vulnerabilities involve platforms using these protocols. Improper encryption practices for web applications exacerbate this issue, placing such vulnerabilities as the second most critical risk on the OWASP Top 10 list of security threats.

Additionally, CyCognito’s research highlights the inadequacy of Web Application Firewalls (WAFs) in protecting web interfaces that handle Personally Identifiable Information (PII). Shockingly, only 50% of PII-handling interfaces are equipped with WAF protection, leaving sensitive data highly susceptible to breaches. Furthermore, 60% of these interfaces lack WAF coverage, compounding the risk of exposing private information to cyberattacks.

Another concern is outdated vulnerability management practices. Traditional approaches often fail to address the dynamic nature of external exposures, leaving critical assets unprotected. To mitigate these risks, organizations must adopt comprehensive and proactive strategies for managing external vulnerabilities, ensuring they secure their digital ecosystems effectively.

ADVERTISEMENT
3rd party Ad. Not an offer or recommendation by techgolly.com.
EDITORIAL TEAM
EDITORIAL TEAM
TechGolly editorial team led by Al Mahmud Al Mamun. He worked as an Editor-in-Chief at a world-leading professional research Magazine. Rasel Hossain and Enamul Kabir are supporting as Managing Editor. Our team is intercorporate with technologists, researchers, and technology writers. We have substantial knowledge and background in Information Technology (IT), Artificial Intelligence (AI), and Embedded Technology.

Latest

ADVERTISEMENT
3rd party Ad. Not an offer or recommendation by techgolly.com.
ADVERTISEMENT
3rd party Ad. Not an offer or recommendation by techgolly.com.

Read More