Report Highlights Rising Cyber Threats from External Vulnerabilities

Cyber Threat Intelligence Facts and Views

Key Points

  • Critical cyber threats often originate from third-party vendors and external sources, posing significant organizational risks.
  • Platforms like Apache, NGINX, and Microsoft IIS account for 34% of severe vulnerabilities in surveyed assets.
  • Protocols like TLS and HTTPS are linked to 15% of severe vulnerabilities. 60% of web interfaces handling PII lack WAF protection, leaving sensitive data vulnerable.
  • Organizations must move beyond outdated vulnerability management practices to safeguard against evolving external threats.

Critical vulnerabilities in digital systems expose organizations to significant security risks, especially as reliance on third-party software and complex supply chains grows. According to the 2024 State of External Exposure Management Report by CyCognito, some of the most dangerous vulnerabilities originate from external sources, highlighting the importance of proactive security measures.

The report emphasizes that third-party vendors play a pivotal role in business operations by providing essential software and hardware. However, they also introduce substantial risks due to misconfigurations and vulnerabilities within the supply chain. Prominent examples like the MOVEit Transfer flaw, Apache Log4J, and Polyfill demonstrate how third-party software often becomes the source of severe threats.

Web servers remain one of the most vulnerable assets in an organization’s IT infrastructure. CyCognito’s findings reveal that web server environments are responsible for 34% of all severe vulnerabilities across surveyed assets. Platforms such as Apache, NGINX, Microsoft IIS, and Google Web Server host more severe issues than 54 other environments combined, making them a critical focus area for cybersecurity efforts.

Cryptographic protocols, including Transport Layer Security (TLS) and HTTPS, pose significant risks. The report states that 15% of all severe vulnerabilities involve platforms using these protocols. Improper encryption practices for web applications exacerbate this issue, placing such vulnerabilities as the second most critical risk on the OWASP Top 10 list of security threats.

Additionally, CyCognito’s research highlights the inadequacy of Web Application Firewalls (WAFs) in protecting web interfaces that handle Personally Identifiable Information (PII). Shockingly, only 50% of PII-handling interfaces are equipped with WAF protection, leaving sensitive data highly susceptible to breaches. Furthermore, 60% of these interfaces lack WAF coverage, compounding the risk of exposing private information to cyberattacks.

Another concern is outdated vulnerability management practices. Traditional approaches often fail to address the dynamic nature of external exposures, leaving critical assets unprotected. To mitigate these risks, organizations must adopt comprehensive and proactive strategies for managing external vulnerabilities, ensuring they secure their digital ecosystems effectively.

EDITORIAL TEAM
EDITORIAL TEAM
TechGolly editorial team led by Al Mahmud Al Mamun. He worked as an Editor-in-Chief at a world-leading professional research Magazine. Rasel Hossain and Enamul Kabir are supporting as Managing Editor. Our team is intercorporate with technologists, researchers, and technology writers. We have substantial knowledge and background in Information Technology (IT), Artificial Intelligence (AI), and Embedded Technology.

Read More

We are highly passionate and dedicated to delivering our readers the latest information and insights into technology innovation and trends. Our mission is to help understand industry professionals and enthusiasts about the complexities of technology and the latest advancements.

Visits Count

Last month: 86272
This month: 2090 🟢Running

Company

Contact Us

Follow Us

TECHNOLOGY ARTICLES

SERVICES

COMPANY

CONTACT US

FOLLOW US