Google Mandiant security analysts warn of a worrying new trend of threat actors demonstrating a better capability to discover and exploit zero-day vulnerabilities in software.

Specifically, of the 138 vulnerabilities disclosed as actively exploited in 2023, Mandiant says 97 (70.3%) were leveraged as zero-days.

This means that threat actors exploited the flaws in attacks before the impacted vendors knew of the bugs existence or had been able to patch them.

  • HobbitFoot
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    1
    ·
    1 month ago

    The thread, like Lemmy, is filled with software engineers and IT professionals who are angry that almost all major tech companies are destaffing and want to use this as a reason that destaffing is bad.

    Security likely a shit show before, especially if more successful attacks previously were of known flaws that weren’t patched.

    • IsThisAnAI@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      2
      ·
      edit-2
      1 month ago

      IDK, every project I touched while working there had some suite of static analysis cve report, secrets scanning, as well as absurdly strict data collection policies and procedures. It was challenging to navigate at times when you had to wait on upstream fixes and crap. The only time I ever saw a fix go live quickly and to the majority of the customer base on quick rollout was for a zero day or active exploit. I’m sure there are gaps, but for as many services they offer, I never saw any crazy shit.

      Google is probably one of the top 10 probed companies in the world and you don’t hear about too many major breeches that originated from the tech. It’s usually legal and sharing with bad partners where they fuck up.