BACK TO THE GREYNOISE RESOURCE HUB

GreyNoise 2022 Mass Exploitation Report

GreyNoise Added Over 230 New Detection Tags In 2022. See Which Ones Topped Our Researchers' Mass Exploitation List.

Not all vulnerabilities are created equal, and many of the ones garnering media attention turn out to be nothing burgers. GreyNoise is in a unique position to help organizations understand what technologies are under mass exploitation, and provides critical tools and data to help you prioritize patching, identify and confidently block malicious sources, and stay ahead of adversaries with unparalleled intelligence for threat hunting.

In our inaugural mass exploitation report, our researchers go deep into the 2022 mass exploitation landscape. Download the report now to gain insights into:

- The Celebrity Vulnerability Hype Cycle, with a breakdown of the CVE-2022-1388, an F5 Big-IP iControl REST Authentication Bypass.
- How hard attackers will work to never let a critical vulnerability go to waste by looking at the depth and breadth of CVE-2022-26134, a critical weakness in Atlassian Confluence.
- What the punishing drumbeat of CISA Known Exploited Vulnerabilities catalog releases does to defenders.

Summary

GreyNoise Added Over 230 New Detection Tags In 2022. See Which Ones Topped Our Researchers' Mass Exploitation List.

Not all vulnerabilities are created equal, and many of the ones garnering media attention turn out to be nothing burgers. GreyNoise is in a unique position to help organizations understand what technologies are under mass exploitation, and provides critical tools and data to help you prioritize patching, identify and confidently block malicious sources, and stay ahead of adversaries with unparalleled intelligence for threat hunting.

In our inaugural mass exploitation report, our researchers go deep into the 2022 mass exploitation landscape. Download the report now to gain insights into:

- The Celebrity Vulnerability Hype Cycle, with a breakdown of the CVE-2022-1388, an F5 Big-IP iControl REST Authentication Bypass.
- How hard attackers will work to never let a critical vulnerability go to waste by looking at the depth and breadth of CVE-2022-26134, a critical weakness in Atlassian Confluence.
- What the punishing drumbeat of CISA Known Exploited Vulnerabilities catalog releases does to defenders.

Read the Case Study
Listen to the Podcast
Watch the Video
READ THE TRANSCRIPT
BACK TO THE GREYNOISE RESOURCE HUB