GreyNoise has detected a significant surge in exploitation activity targeting two vulnerabilities — CVE-2022-47945 and CVE-2023-49103.
The alarming uptick in attacks underscores critical issues in vulnerability management and patch prioritization.
Cybercriminals are actively scanning and exploiting both vulnerabilities, though they are being perceived differently in terms of risk.
GreyNoise observed a substantial increase in exploitation attempts over the past 10 days, sparking urgent calls for action from the security community.
The contrasting treatment of these two vulnerabilities highlights a growing issue in vulnerability management.
CVE-2022-47945, though actively exploited, has not received the same level of attention due to its absence from KEV and its low EPSS score.
Meanwhile, CVE-2023-49103 continues to underline the importance of staying vigilant against already-flagged threats.
Key Lessons for Organizations:
To safeguard against these threats, security teams should:
This incident serves as a stark reminder of the challenges in fortifying cybersecurity perimeters. Real-time exploitation intelligence must become a cornerstone of enterprise risk management strategies.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free
Google has significantly expanded the capabilities of NotebookLM, its AI-powered research tool, by introducing Audio…
Google has released critical security patches for Android devices to address 57 vulnerabilities across multiple…
Hackers are leveraging a sophisticated social engineering technique dubbed "ClickFix" to trick Windows users into…
A newly identified cyberattack campaign has surfaced, leveraging the recognizable branding of India's Ministry of…
Aon’s Stroz Friedberg Incident Response Services has uncovered a method used by a threat actor…
A critical security vulnerability in the Samsung MagicINFO 9 Server has come under active exploit,…