Thursday, 15 May 2025
  • My Feed
  • My Interests
  • My Saves
  • History
  • Blog
Subscribe
Capernaum
  • Finance
    • Cryptocurrency
    • Stock Market
    • Real Estate
  • Lifestyle
    • Travel
    • Fashion
    • Cook
  • Technology
    • AI
    • Data Science
    • Machine Learning
  • Health
    HealthShow More
    Foods That Disrupt Our Microbiome
    Foods That Disrupt Our Microbiome

    Eating a diet filled with animal products can disrupt our microbiome faster…

    By capernaum
    Skincare as You Age Infographic
    Skincare as You Age Infographic

    When I dove into the scientific research for my book How Not…

    By capernaum
    Treating Fatty Liver Disease with Diet 
    Treating Fatty Liver Disease with Diet 

    What are the three sources of liver fat in fatty liver disease,…

    By capernaum
    Bird Flu: Emergence, Dangers, and Preventive Measures

    In the United States in January 2025 alone, approximately 20 million commercially-raised…

    By capernaum
    Inhospitable Hospital Food 
    Inhospitable Hospital Food 

    What do hospitals have to say for themselves about serving meals that…

    By capernaum
  • Sport
  • 🔥
  • Cryptocurrency
  • Data Science
  • Travel
  • Real Estate
  • AI
  • Technology
  • Machine Learning
  • Stock Market
  • Finance
  • Fashion
Font ResizerAa
CapernaumCapernaum
  • My Saves
  • My Interests
  • My Feed
  • History
  • Travel
  • Health
  • Technology
Search
  • Pages
    • Home
    • Blog Index
    • Contact Us
    • Search Page
    • 404 Page
  • Personalized
    • My Feed
    • My Saves
    • My Interests
    • History
  • Categories
    • Technology
    • Travel
    • Health
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Home » Blog » Five Eyes warns of rise in zero-day exploits
Data Science

Five Eyes warns of rise in zero-day exploits

capernaum
Last updated: 2024-11-14 12:01
capernaum
Share
Five Eyes warns of rise in zero-day exploits
SHARE

Five Eyes warns of rise in zero-day exploits

The surge in exploits of zero-day vulnerabilities has become the “new normal,” according to a recent warning from the Five Eyes intelligence alliance—comprising the U.S., U.K., Canada, Australia, and New Zealand. Cybersecurity agencies report a significant increase in hackers targeting previously undisclosed vulnerabilities this year, marking a shift from the trend of exploiting older vulnerabilities that predominated in past years.

At the top of the list: CVE-2023-3519

In a co-authored advisory released on November 14, 2024, the Five Eyes agencies detailed the top 15 most routinely exploited vulnerabilities, highlighting that, for the first time since these annual reports began, most of the listed vulnerabilities were initially exploited as zero-days. At the top of the list is CVE-2023-3519, a remote code execution bug in Citrix’s networking product, NetScaler. This vulnerability, along with CVE-2023-4966—related to sensitive information leaks—underscores Citrix’s significant cyber security woes this year.

Cisco also found itself in the spotlight, occupying the third and fourth positions on the list with vulnerabilities in its IOS XE operating system. Critical issues allow attackers to create local accounts and subsequently elevate their privileges to root. Following closely in fifth place is Fortinet’s FortiOS, also affected by severe vulnerabilities enabling remote code execution through a heap-based buffer overflow. Meanwhile, the file transfer tool MOVEit rounds out the top six, with a SQL injection vulnerability that has proven popular with threat actors.

Ollie Whitehouse, chief technology officer of the U.K.’s National Cyber Security Centre (NCSC), stated, “More routine initial exploitation of zero-day vulnerabilities represents the new normal which should concern end-user organizations and vendors alike as malicious actors seek to infiltrate networks.” In emphasizing the importance of proactive measures, he urged organizations to promptly apply patches and insist on secure-by-design products in the tech marketplace. The message is clear: vigilance in vulnerability management is crucial.

Organizations face a staggering challenge, particularly considering the high-profile list which includes vulnerabilities from well-known software systems. The impact of such breaches can be disastrous, as hackers gain access to sensitive networks and information. The exploitation of vulnerabilities like those in Citrix and Cisco not only risks significant data loss but could also undermine entire systems’ integrity.

Five Eyes warns of rise in zero-day exploits
For the first time since these annual reports began, most of the listed vulnerabilities were initially exploited as zero-days (Image credit)

Another notable entry is Atlassian’s Confluence, ranking seventh, which has a vulnerability allowing attackers to create admin-level accounts on affected servers. Hugely significant is the inclusion of the infamous Apache Log4j vulnerability, which ranks eighth. Despite being discovered in 2021, many organizations have yet to resolve this flaw, showcasing a troubling trend of inadequate patching practices.

Barracuda’s Email Security Gateway follows closely in ninth place due to its problematic input validation issues, popular with state-sponsored attackers. Zoho and PaperCut also made the list, reflecting the breadth of vulnerabilities affecting software across various sectors. Microsoft appears twice, with a 2020 netlogon protocol flaw sitting 12th and an Outlook issue escalating privileges at 14th—demonstrating that even tech giants grapple with legacy vulnerabilities.


Microsoft urges users to update Windows after zero-day vulnerabilities


Finally, open source file-sharing software, ownCloud, rounds out the list with a critical flaw allowing attackers to steal sensitive credentials. As these vulnerabilities persist, the Five Eyes agencies emphasize the importance for organizations to not only remain vigilant but to reinforce security measures from the development stage through to deployment.

Cyber attackers are not taking any breaks, and neither should organizations when safeguarding their digital environments. With the landscape of cyber threats evolving daily, understanding vulnerability trends and adapting swiftly is key to defending against exploitation effectively.


Featured image credit: Wesley Ford/Unsplash

Share This Article
Twitter Email Copy Link Print
Previous Article Gmail enhances productivity with new Gemini side panel Gmail enhances productivity with new Gemini side panel
Next Article Tessl raises $125 million to transform AI software development Tessl raises $125 million to transform AI software development
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Using RSS feeds, we aggregate news from trusted sources to ensure real-time updates on the latest events and trends. Stay ahead with timely, curated information designed to keep you informed and engaged.
TwitterFollow
TelegramFollow
LinkedInFollow
- Advertisement -
Ad imageAd image

You Might Also Like

Building AI Agents? A2A vs. MCP Explained Simply

By capernaum

7 AWS Services for Machine Learning Projects

By capernaum
YouTube’s AI now knows when you’re about to buy
AIData Science

YouTube’s AI now knows when you’re about to buy

By capernaum
Trump forces Apple to rethink its India iPhone strategy
Data ScienceFinance

Trump forces Apple to rethink its India iPhone strategy

By capernaum
Capernaum
Facebook Twitter Youtube Rss Medium

Capernaum :  Your instant connection to breaking news & stories . Stay informed with real-time coverage across  AI ,Data Science , Finance, Fashion , Travel, Health. Your trusted source for 24/7 insights and updates.

© Capernaum 2024. All Rights Reserved.

CapernaumCapernaum
Welcome Back!

Sign in to your account

Lost your password?