![]() Rather, successful cyber threat actors target companies and organizations that run outdated software and operating systems by using years-old vulnerabilities and weaknesses that vendors have already issued patches, and/or published fix-or mitigation actions. According to Corey Sinclair, Cyber Threat Intelligence Analyst at Horizon3ai, "We often find that malicious threat actors do not take advantage of zero-day vulnerabilities. The Apple security vulnerabilities taken in this context are a stark reminder of the dangers of an expanded attack surface with the proliferation of mobile endpoints," he said.Īffected organizations and users can install the updates released by Apple to protect their devices from exploits of the disclosed vulnerabilities. Apple has once again released emergency security updates to fix zero-day vulnerabilities that are being used to attack compromised iPhones, iPads and Macs in the wild. "According to BlackCloak research, 87% of executive devices have no security measures at all installed, and 76% are actively leaking data. Rajiv Pimplaskar, CEO of Dispersive Holdings, Inc., highlighted the cybersecurity risks threatening executive devices. With these high-profile cybersecurity vulnerabilities affecting Apple devices, enterprise security leaders should assess their business leaders' cyber risk. Mobile device security is also a critical part of executive protection. All it takes is one mobile device to fall victim to an exploit as part of a larger attack chain, leaving enterprise data integrity compromised." The problem might not be an iOS issue but more a problem with an app that has gone rogue, especially when new. So far this year, we have seen roughly the same volume of zero-day attacks against mobile, with seven of the 23 in the wild attacks being mobile specific. And it doesnt cost you anything beyond a couple of minutes. Last year, the data showed a 466% increase in mobile-specific zero-day vulnerabilities, accounting for one in three of all reported zero-day attacks. "These latest exploits and vulnerabilities revealed by Apple are just a few of the mobile-specific attacks we have seen this year. "Mobile is a critical part of the enterprise workforce, but remains a largely unaddressed attack surface ripe for exploitation and compromise," said Melick.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |