Connect with us

Hi, what are you looking for?

HEADLINES

Web vulnerabilities in 2017 up by 212 percent

Companies are being urged to beef up their web security as the numbers of web application vulnerabilities are rapidly increasing, as reported in a study by its global partner Imperva Incapsula that shows an overview of web application vulnerabilities in 2017.

According to the study, 2017 saw a whopping 212 percent increase in new vulnerabilities with 14,082 recorded, as compared to 2016’s 6,615. Imperva also states that more than half of these vulnerabilities have a public exploit available to hackers, and that more than a third (36 percent) don’t have an available solution such as a software upgrade workaround or software patch.

Niño Valmonte, Director for Marketing & Digital Innovation, at IP Converge Data Services, Inc. explains that money is the main motivator in the rapid increase of web vulnerabilities. “Websites are common targets because they can generate a substantial amount of money for cybercriminals. For instance, an e-commerce website would normally store personal information. In the wrong hands, we already know the kind of risk we can get exposed to. Also, criminals can hold websites up for ransom from company owners.”

Ransomware, the method of putting up a website for ransom that Valmonte referred to, is a global phenomenon that is predicted to exceed $11.5 billion annually by 2019. The most common form of payment sought from victims in order to get their websites back is the popular cryptocurrency Bitcoin.

Content of websites in peril

Another alarming statistic that the study revealed is the increasing number of vulnerabilities in Content Management Systems (CMS), a tool used to create and manage content posted on a website. The study revealed that WordPress, one of the most commonly used CMS today, posted a 400% increase in new vulnerabilities since 2016, with 75% coming from third-party vendor plugins.

Advertisement. Scroll to continue reading.

IPC urges businesses to be wary of this as when successfully infiltrated, cybercriminals can use the CMS to edit, remove, and even post content on a website. The damage may range from altering text to even changing the visual appearance of the entire website, a tactic commonly known as defacement. Criminals can also extract sensitive information stored inside a website through the CMS.

“These findings should serve as a wake-up call for organizations to put up stronger web security protocols. CMS infiltration should not be taken lightly because this is only the tip of the iceberg. CMS attacks also pose risks to personal and confidential data,” Valmonte said.

To protect one’s website, IPC recommends deploying security measures such as applying a Web Application Firewall (WAF) that can monitor and control incoming web traffic.

As one of the leading DDoS Mitigation service providers, IPC provides subscription-based WAF service through IPC InCAST (In-Country Attack Scrubbing Tactics) services, a cloud-based Web Application Firewall proxy solution that is supported by the country’s first and only DDoS Mitigation Service to feature local data scrubbing.

“By closely monitoring network traffic, WAF can detect and block any malicious data, thereby stopping an attack from happening in the first place,” explained Valmonte.

Advertisement. Scroll to continue reading.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

Organizations must implement a risk assessment methodology that is aligned with their operational realities – by establishing a clear asset baseline, organizations can engage...

APPS

Experts suggest that the goal of the attackers is to steal cryptocurrency assets from residents of Southeast Asia and China. Users in the Philippines...

White Papers

Nearly 50% of companies paid the ransom to get their data back – the second highest rate of ransom payment for ransom demands in...

GAMING

To help players stay safe, Kaspersky is launching “Case 404” — an interactive cybersecurity game that teaches Gen Z how to recognize threats and protect their...

HEADLINES

A zero-trust secure connection has many applications beyond automotive. It’s really for any industry that cares about security, and managing that security at scale.

HEADLINES

Organisations across the Asia-Pacific and Japan region are putting their security posture first, and many are now detecting intrusions early in the attack lifecycle,...

HEADLINES

Agentic AI Assistants—such as Apple Siri, Google Gemini, Microsoft Copilot, OpenAI ChatGPT, and others—are increasingly available to mobile users in consumer and enterprise environments. However, the same...

HEADLINES

Based on breach-tracking research conducted for over two decades, over 124 million Filipino user accounts have been compromised since 2004. This puts the Philippines...

Advertisement