Header image

Insecure Protocols Being Used Across Wide Area Networks

Web traffic still run over HTTP as older vulnerabilities are most troublesome.

Organisations continue to run insecure protocols across their wide access networks (WAN), making it easier for cybercriminals to move across networks.

Analysis of 1.26 trillion network flows by Cato Networks found 62% of all web application traffic is run over HTTP, and 46% of all traffic is run over SMB v1 or v2, instead of SMBv3.

Also when evaluating the top ten inbound common vulnerabilities and exposures (CVEs), a seven-year-old attack targeting the PHPUnit testing framework (CVE-2017-9841) was the most common, and it was found across 33% of the inbound CVE exploitations observed.

Furthermore, three years after its discovery, Log4J (CVE-2021-44228) remains one of the most used exploits and it was found across 30% of the outbound CVE exploitations observed.

Upcoming Events

08
Aug
Webinar

How to Automate the Lifecycle of Joiners, Movers, and Leavers With No-Code Solutions

Streamlining the lifecycle of joiners, movers, and leavers using no-code automation

The process of onboarding new employees and quickly removing departing staff profiles can be both time-consuming and labour-intensive.
In this live webinar, we will look at how to streamline these processes to save time and resources, and providing a smooth experience for both admins and employees.

Key takeaways:
  • Understanding the importance of securing the joiners, movers and leavers process
  • Exploring successful attacks that occurred due to errors in managing these transitions
  • Discover which advanced controls can be utilized
image image image