GreyNoise has detected a significant surge in exploitation activity targeting two vulnerabilities — CVE-2022-47945 and CVE-2023-49103.
The alarming uptick in attacks underscores critical issues in vulnerability management and patch prioritization.
Cybercriminals are actively scanning and exploiting both vulnerabilities, though they are being perceived differently in terms of risk.
GreyNoise observed a substantial increase in exploitation attempts over the past 10 days, sparking urgent calls for action from the security community.
The contrasting treatment of these two vulnerabilities highlights a growing issue in vulnerability management.
CVE-2022-47945, though actively exploited, has not received the same level of attention due to its absence from KEV and its low EPSS score.
Meanwhile, CVE-2023-49103 continues to underline the importance of staying vigilant against already-flagged threats.
Key Lessons for Organizations:
To safeguard against these threats, security teams should:
This incident serves as a stark reminder of the challenges in fortifying cybersecurity perimeters. Real-time exploitation intelligence must become a cornerstone of enterprise risk management strategies.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free
In recent months, a sophisticated social engineering technique known as ClickFix has gained significant traction…
A critical security incident has been uncovered involving the popular GitHub Action tj-actions/changed-files, which is…
The FBI has issued a warning about a growing threat involving free file conversion tools,…
A recent investigation has uncovered previously unknown cryptojacking malware, dubbed MassJacker, which primarily targets users…
SocGholish, a sophisticated malware-as-a-service (MaaS) framework, has been identified as a key enabler in the…
A recent cybersecurity threat has emerged in the form of a steganographic campaign that uses…