{"id":2668,"date":"2021-07-29T15:51:38","date_gmt":"2021-07-29T10:21:38","guid":{"rendered":"https:\/\/xiarch.com\/blog\/?p=2668"},"modified":"2021-07-29T15:51:40","modified_gmt":"2021-07-29T10:21:40","slug":"here-are-the-top-targeted-vulnerabilities-of-the-last-two-years-fbi-discloses","status":"publish","type":"post","link":"https:\/\/xiarch.com\/blog\/here-are-the-top-targeted-vulnerabilities-of-the-last-two-years-fbi-discloses\/","title":{"rendered":"Here are the top Targeted vulnerabilities of the Last two years &#8211; FBI discloses"},"content":{"rendered":"\n<p><p style=\"text-align: justify;\">A joint security advisory concern discovered today by some cybersecurity agencies from the US, the UK, and Australia reveals the top 30 most targeted security vulnerabilities of the last two years. CISA, the Australian Cyber Security Center (ACSC), the United Kingdom\u2019s National Cyber Security Center (NCSC), and the Federal Bureau of Investigation (FBI) also shared mitigation to help private and public sector organizations counter these vulnerabilities.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">\u201cCollaboration is a most crucial part of CISA\u2019s work and today we collaborate with ACSC, NCSC and FBI to highlight cyber vulnerabilities that public and private organization should prioritize for patching to minimize risk of being exploited by malicious actors,\u201d said Eric Goldstein, CISA Executive Assistant Director for Cybersecurity.<\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Attacks Focused Remote Work, VPN, Cloud Technologies<\/strong><\/h2>\n\n\n\n<p><p style=\"text-align: justify;\">Based on information gathered by the US Government, most of the top targeted errors last year were revealed since the start of 2020, with the trend stemming from the recent move to remote work since the starting of the pandemic.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">\u201cThe immediate shift and increased use of remote work options, such as Virtual Private Networks (VPNs) and cloud-based surroundings, likely placed additional force on cyber defenders suffering to handle and keep pace with routing software patching,\u201d CISA explains.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">While the attackers are taking advantage of the situation to remote working, four of the most constantly targeted vulnerabilities during 2020 harm work-from-home (WFH), VPNs, or cloud-based technologies, as mentioned in the table below.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">\u201cIn 2021, malicious cyber actors constant to target various vulnerabilities in perimeter-type devices. Among those very highly exploited in 2021 are vulnerabilities in Microsoft, Pulse, Accellion, VMware, and Fortinet,\u201d CISA stated. As further mentioned in the advisory, attackers keep exploiting publicly called (often old) security flaws harming a broad set of targets from various industry sectors.<\/p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"829\" height=\"428\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/07\/Here-are-the-top-Targeted-vulnerabilities-of-the-Last-two-years-FBI-discloses-image1.png\" alt=\"Here-are-the-top-Targeted-vulnerabilities-of-the-Last-two-years-FBI-discloses-image1.png\" class=\"wp-image-2670\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/07\/Here-are-the-top-Targeted-vulnerabilities-of-the-Last-two-years-FBI-discloses-image1.png 829w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/07\/Here-are-the-top-Targeted-vulnerabilities-of-the-Last-two-years-FBI-discloses-image1-300x155.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/07\/Here-are-the-top-Targeted-vulnerabilities-of-the-Last-two-years-FBI-discloses-image1-768x397.png 768w\" sizes=\"(max-width: 829px) 100vw, 829px\" \/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Why did Companies urge to Patch their System?<\/strong><\/h2>\n\n\n\n<p><p style=\"text-align: justify;\">CISA, ACSC, the NCSC, and the FBI advise public and private orgs across the world to patch and update their systems as soon as possible to reduce their attack surface.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">\u201cIndividuals across the world can mitigate the vulnerabilities listed in this report by implementing the available patches to their systems and implementing a centralized patch management system,\u201d the joint advisory stated. Those who cannot urgently patch or don\u2019t plan to patch soon should go through for signs of negotiation and initiate incident response at a time and recovery plans.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">The four agencies have also revealed indicators of negotiation, recommended mitigations, various detection methods, and links to patches for each of the vulnerabilities listed in the advisory. \u201cThe advisory posted today puts the power in each and every association\u2019s hand to fix the most common vulnerabilities, like unpactched VPN gateway devices,\u201d NCSC\u2019s Director for Operation, Paul Chichester added.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">\u201cWorking with the international partners, we will promote to raise awareness of the threats posed by those that seek to cause a big harm.\u201d<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A joint security advisory concern discovered today by some cybersecurity agencies from the US, the UK, and Australia reveals the top 30 most targeted security vulnerabilities of the last two years. CISA, the Australian Cyber Security Center (ACSC), the United Kingdom\u2019s National Cyber Security Center (NCSC), and the Federal Bureau of Investigation (FBI) also shared [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2671,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[15],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Here are the top Targeted vulnerabilities of the Last two years - FBI discloses - Xiarch Solutions Private Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xiarch.com\/blog\/here-are-the-top-targeted-vulnerabilities-of-the-last-two-years-fbi-discloses\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Here are the top Targeted vulnerabilities of the Last two years - FBI discloses - Xiarch Solutions Private Limited\" \/>\n<meta property=\"og:description\" content=\"A joint security advisory concern discovered today by some cybersecurity agencies from the US, the UK, and Australia reveals the top 30 most targeted security vulnerabilities of the last two years. CISA, the Australian Cyber Security Center (ACSC), the United Kingdom\u2019s National Cyber Security Center (NCSC), and the Federal Bureau of Investigation (FBI) also shared [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiarch.com\/blog\/here-are-the-top-targeted-vulnerabilities-of-the-last-two-years-fbi-discloses\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiarch Solutions Private Limited\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xiarch\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-29T10:21:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-29T10:21:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/07\/Here-are-the-top-Targeted-vulnerabilities-of-the-Last-two-years-FBI-discloses-featured-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"525\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xiarch Security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xiarch\" \/>\n<meta name=\"twitter:site\" content=\"@xiarch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xiarch Security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xiarch.com\/blog\/here-are-the-top-targeted-vulnerabilities-of-the-last-two-years-fbi-discloses\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/here-are-the-top-targeted-vulnerabilities-of-the-last-two-years-fbi-discloses\/\"},\"author\":{\"name\":\"Xiarch Security\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\"},\"headline\":\"Here are the top Targeted vulnerabilities of the Last two years &#8211; FBI discloses\",\"datePublished\":\"2021-07-29T10:21:38+00:00\",\"dateModified\":\"2021-07-29T10:21:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xiarch.com\/blog\/here-are-the-top-targeted-vulnerabilities-of-the-last-two-years-fbi-discloses\/\"},\"wordCount\":483,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"articleSection\":[\"Infosec News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/xiarch.com\/blog\/here-are-the-top-targeted-vulnerabilities-of-the-last-two-years-fbi-discloses\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xiarch.com\/blog\/here-are-the-top-targeted-vulnerabilities-of-the-last-two-years-fbi-discloses\/\",\"url\":\"https:\/\/xiarch.com\/blog\/here-are-the-top-targeted-vulnerabilities-of-the-last-two-years-fbi-discloses\/\",\"name\":\"Here are the top Targeted vulnerabilities of the Last two years - FBI discloses - Xiarch Solutions Private Limited\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#website\"},\"datePublished\":\"2021-07-29T10:21:38+00:00\",\"dateModified\":\"2021-07-29T10:21:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/xiarch.com\/blog\/here-are-the-top-targeted-vulnerabilities-of-the-last-two-years-fbi-discloses\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xiarch.com\/blog\/here-are-the-top-targeted-vulnerabilities-of-the-last-two-years-fbi-discloses\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xiarch.com\/blog\/here-are-the-top-targeted-vulnerabilities-of-the-last-two-years-fbi-discloses\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xiarch.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Here are the top Targeted vulnerabilities of the Last two years &#8211; FBI discloses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xiarch.com\/blog\/#website\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"name\":\"Xiarch Solutions Private Limited\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xiarch.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\",\"name\":\"Xiarch\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"contentUrl\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"width\":300,\"height\":300,\"caption\":\"Xiarch\"},\"image\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/xiarch\/\",\"https:\/\/twitter.com\/xiarch\",\"https:\/\/www.linkedin.com\/company\/xiarch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\",\"name\":\"Xiarch Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"caption\":\"Xiarch Security\"},\"sameAs\":[\"https:\/\/xiarch.com\/blog\/\"],\"url\":\"https:\/\/xiarch.com\/blog\/author\/vector\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Here are the top Targeted vulnerabilities of the Last two years - FBI discloses - Xiarch Solutions Private Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xiarch.com\/blog\/here-are-the-top-targeted-vulnerabilities-of-the-last-two-years-fbi-discloses\/","og_locale":"en_US","og_type":"article","og_title":"Here are the top Targeted vulnerabilities of the Last two years - FBI discloses - Xiarch Solutions Private Limited","og_description":"A joint security advisory concern discovered today by some cybersecurity agencies from the US, the UK, and Australia reveals the top 30 most targeted security vulnerabilities of the last two years. CISA, the Australian Cyber Security Center (ACSC), the United Kingdom\u2019s National Cyber Security Center (NCSC), and the Federal Bureau of Investigation (FBI) also shared [&hellip;]","og_url":"https:\/\/xiarch.com\/blog\/here-are-the-top-targeted-vulnerabilities-of-the-last-two-years-fbi-discloses\/","og_site_name":"Xiarch Solutions Private Limited","article_publisher":"https:\/\/www.facebook.com\/xiarch\/","article_published_time":"2021-07-29T10:21:38+00:00","article_modified_time":"2021-07-29T10:21:40+00:00","og_image":[{"width":1000,"height":525,"url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/07\/Here-are-the-top-Targeted-vulnerabilities-of-the-Last-two-years-FBI-discloses-featured-image.jpg","type":"image\/jpeg"}],"author":"Xiarch Security","twitter_card":"summary_large_image","twitter_creator":"@xiarch","twitter_site":"@xiarch","twitter_misc":{"Written by":"Xiarch Security","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiarch.com\/blog\/here-are-the-top-targeted-vulnerabilities-of-the-last-two-years-fbi-discloses\/#article","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/here-are-the-top-targeted-vulnerabilities-of-the-last-two-years-fbi-discloses\/"},"author":{"name":"Xiarch Security","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c"},"headline":"Here are the top Targeted vulnerabilities of the Last two years &#8211; FBI discloses","datePublished":"2021-07-29T10:21:38+00:00","dateModified":"2021-07-29T10:21:40+00:00","mainEntityOfPage":{"@id":"https:\/\/xiarch.com\/blog\/here-are-the-top-targeted-vulnerabilities-of-the-last-two-years-fbi-discloses\/"},"wordCount":483,"commentCount":0,"publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"articleSection":["Infosec News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xiarch.com\/blog\/here-are-the-top-targeted-vulnerabilities-of-the-last-two-years-fbi-discloses\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xiarch.com\/blog\/here-are-the-top-targeted-vulnerabilities-of-the-last-two-years-fbi-discloses\/","url":"https:\/\/xiarch.com\/blog\/here-are-the-top-targeted-vulnerabilities-of-the-last-two-years-fbi-discloses\/","name":"Here are the top Targeted vulnerabilities of the Last two years - FBI discloses - Xiarch Solutions Private Limited","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/#website"},"datePublished":"2021-07-29T10:21:38+00:00","dateModified":"2021-07-29T10:21:40+00:00","breadcrumb":{"@id":"https:\/\/xiarch.com\/blog\/here-are-the-top-targeted-vulnerabilities-of-the-last-two-years-fbi-discloses\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiarch.com\/blog\/here-are-the-top-targeted-vulnerabilities-of-the-last-two-years-fbi-discloses\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/xiarch.com\/blog\/here-are-the-top-targeted-vulnerabilities-of-the-last-two-years-fbi-discloses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiarch.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Here are the top Targeted vulnerabilities of the Last two years &#8211; FBI discloses"}]},{"@type":"WebSite","@id":"https:\/\/xiarch.com\/blog\/#website","url":"https:\/\/xiarch.com\/blog\/","name":"Xiarch Solutions Private Limited","description":"","publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiarch.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiarch.com\/blog\/#organization","name":"Xiarch","url":"https:\/\/xiarch.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","contentUrl":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","width":300,"height":300,"caption":"Xiarch"},"image":{"@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/xiarch\/","https:\/\/twitter.com\/xiarch","https:\/\/www.linkedin.com\/company\/xiarch"]},{"@type":"Person","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c","name":"Xiarch Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","caption":"Xiarch Security"},"sameAs":["https:\/\/xiarch.com\/blog\/"],"url":"https:\/\/xiarch.com\/blog\/author\/vector\/"}]}},"_links":{"self":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/2668"}],"collection":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/comments?post=2668"}],"version-history":[{"count":1,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/2668\/revisions"}],"predecessor-version":[{"id":2672,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/2668\/revisions\/2672"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media\/2671"}],"wp:attachment":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media?parent=2668"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/categories?post=2668"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/tags?post=2668"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}