A new report from Palo Alto's Unit 42 found it only takes 15 minutes after the publication of a new CVE for the first cybercriminals to begin scanning potentially vulnerable targets. Within a few hours, the first active exploitation attempts have already started.
The report shows that the ProxyShell exploit chain was the most-exploited vulnerability in the first half of this year, making up 55% of all attacks. This was followed by Log4j at 14%.
In the first half of this year alone, 13,000 vulnerabilities were reported. Not all of these were critical, but some of them allowed for remote code execution leading to full system compromise.
Acronis Cyber Protect Cloud includes built-in vulnerability assessment and patch management capabilities, helping you to automatically identify and address workloads in need of an update.
About Acronis
Acronis is a Swiss company, founded in Singapore. Celebrating two decades of innovation, Acronis has more than 1,800 employees in 45 locations. The Acronis Cyber Protect Cloud solution is available in 26 languages in over 150 countries and is used by 20,000 service providers to protect over 750,000 businesses.