A vulnerability is a security weakness that cybercriminals can exploit to obtain unauthorized access to computer systems or networks. A cybercriminal exploiting a vulnerability can perform various malicious actions, such as installing malicious software (malware), running malicious code, and stealing sensitive data.
Common exploitation techniques include SQL injection (SQLi), cross-site scripting (XSS), and buffer overflow. Cybercriminals also use open source exploit kits to find known vulnerabilities in web applications. Vulnerabilities that impact popular software place the vendor’s customers at a high risk of a supply chain attack and data breach.
Modern, enterprise-grade security testing for web, API, business logic, and LLMs at the speed of deployment.
This is part of a series of articles about vulnerability management.
In this article:
Here are the four main types of vulnerabilities in information security:
Here are common categories of security vulnerabilities to watch out for:
Related content: Read our guide to vulnerability testing.
Microsoft disclosed a vulnerability in January 2020, admitting that an internal customer support database that stored the company’s anonymized user analytics got exposed online accidentally. This accidental server exposure resulted from misconfigured Azure security rules that Microsoft deployed on December 5, 2019.
Microsoft expressed confidence that commercial cloud services were not exposed, and the company’s engineers remediated the configuration quickly to prevent unauthorized access to the exposed database. Unfortunately, the 2020 data breach exposed IP addresses, email addresses, and other data stored in the support case analytics database.
In January 2020, threat actors abused a third-party application Marriott used for guest services, obtaining unauthorized access to 5.2 million records of Marriott guests. These records included contact information, passport data, gender, loyalty account details, birthdays, and personal preferences.
By the end of February 2020, Marriott’s security team noticed the suspicious activity and sealed the insider-caused breach. This data breach presumably affected nearly 339 million hotel guests. Since the company failed to comply with General Data Protection Regulation (GDPR) requirements, Marriott Hotels & Resorts had to pay an £18.4 million fine.
Ring is a home security and smart home company owned by Amazon. In recent years, the company has experienced two security incidents:
Cybercriminals used weak, default, and recycled credentials during the IoT breach to access live feeds from cameras around Ring customers’ homes. They could also use the devices’ integrated microphones and speakers to communicate remotely. More than thirty people in fifteen families reported that cybercriminals were verbally harassing them.
SolarWinds provides IT software to around 33,000 customers, including government entities and large corporations. In 2022, cybercriminals injected malicious code into one of SolarWinds’ software systems, transferring the code to all customers during a regular system update.
This malicious code allowed cybercriminals to install more malware and spy on organizations and government agencies, including the Treasury Department and the US Department of Homeland Security.
In June 2021, Cognyte, a cyber analytics firm, failed to secure the company’s database, exposing five billion records that revealed previous data incidents. These records were posted online without any authentication, like passwords. Cognyte’s database was exposed for four days. While it is unclear how many passwords were exposed, the records contained names, email addresses, and the data source.
Learn more in our detailed guide to vulnerability cve.
Modern, enterprise-grade security testing for web, API, business logic, and LLMs at the speed of deployment.
Bright Security helps address the shortage of security personnel, enabling AppSec teams to provide governance for security testing, and enabling every developer to run their own security tests.
Brightempowers developers to incorporate an automated Dynamic Application Security Testing (DAST), earlier than ever before, into their unit testing process so they can resolve security concerns as part of their agile development process. Bright’s DAST platform integrates into the SDLC fully and seamlessly:
Bright Security can scan any target, whether Web Apps, APIs (REST/SOAP/GraphQL) to help enhance DevSecOps and achieve regulatory compliance with our real-time, false positive free actionable reports of vulnerabilities. In addition, our ML-based DAST solution provides an automated solution to identify Business Logic Vulnerabilities.
DORA (Digital Operational Resilience Act) is the latest addition to the EU regulatory arsenal. A framework designed to bolster the cyber resilience of financial entities operating within the EU. But let’s face it: there’s no lack of regulations issued by the European Union legislature, and they’re not exactly known for keeping things light and easy.
July 9, 2024Streamline appsec with IASTless IAST. Simplify deployment, enhance accuracy, and boost your security posture by combining SAST and Bright’s DAST.
June 19, 2024AI-generated code is basically the holy grail of developer tools of this decade. Think back to just over two years ago; every third article discussed how there weren’t enough engineers to answer demand; some companies even offered coding training for candidates wanting to make a career change. The demand for software and hardware innovation was