close
close
Your Network of Tomorrow
Your Network of Tomorrow
Plan your path toward a faster, more secure, and more resilient network designed for the applications and users that you support.
          Experience Netskope
          Get Hands-on With the Netskope Platform
          Here's your chance to experience the Netskope One single-cloud platform first-hand. Sign up for self-paced, hands-on labs, join us for monthly live product demos, take a free test drive of Netskope Private Access, or join us for a live, instructor-led workshops.
            A Leader in SSE. Now a Leader in Single-Vendor SASE.
            A Leader in SSE. Now a Leader in Single-Vendor SASE.
            Netskope debuts as a Leader in the Gartner® Magic Quadrant™ for Single-Vendor SASE
              Securing Generative AI for Dummies
              Securing Generative AI for Dummies
              Learn how your organization can balance the innovative potential of generative AI with robust data security practices.
                Modern data loss prevention (DLP) for Dummies eBook
                Modern Data Loss Prevention (DLP) for Dummies
                Get tips and tricks for transitioning to a cloud-delivered DLP.
                  Modern SD-WAN for SASE Dummies Book
                  Modern SD-WAN for SASE Dummies
                  Stop playing catch up with your networking architecture
                    Understanding where the risk lies
                    Advanced Analytics transforms the way security operations teams apply data-driven insights to implement better policies. With Advanced Analytics, you can identify trends, zero in on areas of concern and use the data to take action.
                        The 6 Most Compelling Use Cases for Complete Legacy VPN Replacement
                        The 6 Most Compelling Use Cases for Complete Legacy VPN Replacement
                        Netskope One Private Access is the only solution that allows you to retire your VPN for good.
                          Colgate-Palmolive Safeguards its "Intellectual Property” with Smart and Adaptable Data Protection
                          Colgate-Palmolive Safeguards its "Intellectual Property” with Smart and Adaptable Data Protection
                            Netskope GovCloud
                            Netskope achieves FedRAMP High Authorization
                            Choose Netskope GovCloud to accelerate your agency’s transformation.
                              Let's Do Great Things Together
                              Netskope’s partner-centric go-to-market strategy enables our partners to maximize their growth and profitability while transforming enterprise security.
                                Netskope solutions
                                Netskope Cloud Exchange
                                Netskope Cloud Exchange (CE) provides customers with powerful integration tools to leverage investments across their security posture.
                                  Netskope Technical Support
                                  Netskope Technical Support
                                  Our qualified support engineers are located worldwide and have diverse backgrounds in cloud security, networking, virtualization, content delivery, and software development, ensuring timely and quality technical assistance
                                    Netskope video
                                    Netskope Training
                                    Netskope training will help you become a cloud security expert. We are here to help you secure your digital transformation journey and make the most of your cloud, web, and private applications.

                                      Cloud Threats Memo: What We Can Learn From the Top 15 Routinely Exploited Threats of 2021

                                      May 05 2022

                                      Have you ever wondered what vulnerabilities are exploited the most by threat actors? The answers you have been eagerly waiting for could be found inside a joint Cybersecurity Advisory (CSA) coauthored by the cybersecurity authorities of the United States (CISA), Australia (ACSC), Canada (CCCS), New Zealand (NZ NCSC), and the United Kingdom (NCSC-UK), plus the U.S. National Security Agency (NSA) and Federal Bureau of Investigation (FBI). In fact, the alert AA22-117A provides details on the Top 15 Common Vulnerabilities and Exposures (CVEs) routinely exploited by malicious cyber actors in 2021, as well as other frequently exploited CVEs.

                                      Unsurprisingly, the usual suspects such as Log4Shell, and the different flavors of ProxyShell (CVE-2021-34523, CVE-2021-34473, and CVE-2021-31207) and ProxyLogon (CVE-2021-27065, CVE-2021-26858, CVE-2021-26857, CVE-2021-26855) are very well positioned in this unwelcome chart, but in general, the opportunistic and state-sponsored threat actors were still very busy over the course of 2021 exploiting virtually any possible vulnerability targeting internet-facing services.

                                      Top 15 Routinely Exploited Vulnerabilities in 2021 (from AA22-117A)

                                      Table of the Top 15 Routinely Exploited Vulnerabilities in 2021

                                      Similarly, the data shows that too many organizations have poor patching procedures in place. In fact, what is also (un)surprising is the fact that among the top 15 exploited vulnerabilities there were also two old exploits (CVE-2018-13379 and CVE-2019-11510) targeting legacy remote access technologies that were supposed to have been patched a long time ago (given that the two vulnerabilities date back to 2018 and 2019).

                                      Remote working has become the new normal, and organizations need to make their systems accessible from a distributed workforce without significant impacts on the user experience (which sometimes collides with the legacy concept of security), and this is creating an incredible opportunity for the attackers.

                                      How Netskope mitigates the risk of internet-facing systems being exploited by threat actors

                                      Netskope Private Access provides an alternative to legacy remote access technologies, embracing the Zero Trust paradigm and allowing organizations to publish virtually any resource without making it explicitly visible and capable of accepting explicit inbound connections (and hence mitigating the risk of exploitation of zero-day or unpatched vulnerabilities). It is possible to publish resources located in a local data center, but also in a private or public cloud, segmenting the access at the application level (in contrast to a traditional layer 3 VPN) and performing a security posture check before the access to the requested resource is granted.

                                      At every moment the organization can monitor access to the published assets thanks to a specific dashboard available with Netskope Advanced Analytics, with rich details and insights, supporting the security and operation teams.


                                      Stay safe!

                                      author image
                                      Paolo Passeri
                                      Paolo supports Netskope’s customers in protecting their journey to the cloud and is a security professional, with 20+ years experience in the infosec industry.
                                      Paolo supports Netskope’s customers in protecting their journey to the cloud and is a security professional, with 20+ years experience in the infosec industry.

                                      Stay informed!

                                      Subscribe for the latest from the Netskope Blog