GreyNoise has detected a significant surge in exploitation activity targeting two vulnerabilities — CVE-2022-47945 and CVE-2023-49103.
The alarming uptick in attacks underscores critical issues in vulnerability management and patch prioritization.
Cybercriminals are actively scanning and exploiting both vulnerabilities, though they are being perceived differently in terms of risk.
GreyNoise observed a substantial increase in exploitation attempts over the past 10 days, sparking urgent calls for action from the security community.
The contrasting treatment of these two vulnerabilities highlights a growing issue in vulnerability management.
CVE-2022-47945, though actively exploited, has not received the same level of attention due to its absence from KEV and its low EPSS score.
Meanwhile, CVE-2023-49103 continues to underline the importance of staying vigilant against already-flagged threats.
Key Lessons for Organizations:
To safeguard against these threats, security teams should:
This incident serves as a stark reminder of the challenges in fortifying cybersecurity perimeters. Real-time exploitation intelligence must become a cornerstone of enterprise risk management strategies.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free
A subgroup of the Russian state-sponsored hacking group Seashell Blizzard, also known as Sandworm, has…
A newly uncovered cyber campaign, dubbed "BadPilot," has been linked to a subgroup of the…
Cybersecurity analysts have identified that hackers are leveraging the open-source Pyramid pentesting tool to establish…
Foreign adversaries, including Russia, China, and Iran, are intensifying their efforts to manipulate public opinion…
Netskope Threat Labs has uncovered a sophisticated phishing campaign targeting users across various industries, including…
A critical security vulnerability in the "Security & Malware scan by CleanTalk" plugin has left…