Basic vulnerabilities statistics

A distributed network of ‘honeypots’, computers running special network traffic capture software, can be used to easily track the distribution of the most popular exploits and commonly exploited vulnerabilities. Collecting data from a reasonably large number of systems,and sorting it by type, source and destination provides statistics on the most common attacks, the most secure (or insecure) geographical areas and how the preferences for one set of exploits or another changes over time.

For instance, here’s the list of the most exploited vulnerabilities collected by the Smallpot project for September 2004:

Most exploited vulnerabilities reported by the Smallpot project in September 2004

The SANS (SysAdmin, Audit, Network, Security) Institute and the National Infrastructure Protection Center (NIPC) at the FBI also releases a document listing the most critical Internet security vulnerabilities every year.

This is SANS Top 20 vulnerabilities for 2004:

  • Top Vulnerabilities to Windows Systems
    • W1 Web Servers & Services
    • W2 Workstation Service
    • W3 Windows Remote Access Services
    • W4 Microsoft SQL Server (MSSQL)
    • W5 Windows Authentication
    • W6 Web Browsers
    • W7 File-Sharing Applications
    • W8 LSAS Exposures
    • W9 Mail Client
    • W10 Instant Messaging
  • Top Vulnerabilities to UNIX Systems
    • U1 BIND Domain Name System
    • U2 Web Server
    • U3 Authentication
    • U4 Version Control Systems
    • U5 Mail Transport Service
    • U6 Simple Network Management Protocol (SNMP)
    • U7 Open Secure Sockets Layer (SSL)
    • U8 Misconfiguration of Enterprise Services NIS/NFS
    • U9 Databases
    • U10 Kernel

Gas is too expensive? Let’s make it cheap!

A search online lead me to a discovery I didn’t think was possible nowadays. I realized almost immediately that critical security issues were probably involved. I found that out of the many tens of thousands of gas stations the company claimed to have installed their product in, 1,000 are remotely hackable. Read Full Article


DDoS attacks in Q4 2017

Q4 2017 represented something of a lull: both the number and duration of DDoS attacks were down against the previous quarter. At the same time, the increase in the number of attacks on honeypot traps in the runup to holiday sales indicates that cybercriminals are keen to expand their botnets at the most opportune moment by pressuring owners of online resources and preventing them from making a profit. Read Full Article


IoT lottery: finding a perfectly secure connected device

Being enthusiastic shoppers just like many other people around the world, at Kaspersky Lab we are, however paranoid enough to look at any Internet of Things (IoT)-device with some concern, even when the price is favorable. So we randomly took several different connected devices and reviewed their security set up. Read Full Article


Threat Predictions for Connected Health in 2018

In 2017, Kaspersky Lab research revealed the extent to which medical information and patient data stored within the connected healthcare infrastructure is left unprotected and accessible online for any motivated cybercriminal to discover. This risk is heightened because cyber-villains increasingly understand the value of health information, its ready availability, and the willingness of medical facilities to pay to get it back. Read Full Article


Threat Predictions for Automotive in 2018

Remote fault diagnostics, telematics and connected infotainment significantly enhance driver safety and enjoyment, but they also present new challenges for the automotive sector as they turn vehicles into prime targets for cyberattack. The growing risk of a vehicle’s systems being infiltrated or having its safety, privacy and financial elements violated, requires manufacturers to understand and apply IT security. Read Full Article


Kaspersky Security Bulletin: Threat Predictions for 2018

Looking back at a year like 2017 brings the internal conflict of being a security researcher into full view: on the one hand, each new event is an exciting new research avenue for us, as what were once theoretical problems find palpable expression in reality. On the other hand, as people with a heightened concern for the security posture of users at large, each event is a bigger catastrophe. Read Full Article