
Trend #3: Vulnerabilities
High profile vulnerabilities such as ProxyLogon and ProxyShell targeted Microsoft Exchange servers and affected a massive number of systems, leading to ransomware deployment. The exploitation of Kaseya VSA appliance software led to ransomware deployments on thousands of organizations that used the software for remote administration of endpoints. Red Canary notes the nuances within vulnerabilities are just flaws in code— a threat must exploit that vulnerability.
Return To Article