{"id":85456,"date":"2024-08-14T16:17:04","date_gmt":"2024-08-14T12:17:04","guid":{"rendered":"https:\/\/techxmedia.com\/?p=85456"},"modified":"2024-08-14T16:17:10","modified_gmt":"2024-08-14T12:17:10","slug":"cves-rise-30-in-2024-qualys-warns-of-growing-security-threats","status":"publish","type":"post","link":"https:\/\/techxmedia.com\/en\/cves-rise-30-in-2024-qualys-warns-of-growing-security-threats\/","title":{"rendered":"CVEs Rise 30% in 2024, Qualys Warns of Growing Security Threats"},"content":{"rendered":"\n<p>The Qualys Threat Research Unit (TRU) has revealed a significant 30% increase in Common Vulnerabilities and Exposures (CVEs) for 2024. From January to mid-July, the number of reported CVEs surged from 17,114 in 2023 to 22,254 in 2024, reflecting a growing cybersecurity challenge. This rise highlights the urgent need for enhanced vulnerability management and security measures.<\/p>\n\n\n\n<p>The research indicates that 0.91% of these vulnerabilities, totaling 204, have been weaponized, posing substantial risks. These weaponized CVEs are primarily exploited through public-facing applications and remote services, emphasizing the need for targeted security responses. Additionally, the data shows a 10% increase in the weaponization of older CVEs, stressing the importance of addressing pre-existing vulnerabilities.<\/p>\n\n\n\n<p>Prominent vulnerabilities, such as CVE-2023-43208, affecting healthcare systems, and several others identified by Qualys, have seen increased exploitation. Saeed Abbasi, Product Manager of Vulnerability Research at Qualys TRU, underscores the necessity for a proactive approach in cybersecurity, including continuous monitoring and rapid patch management.<\/p>\n\n\n\n<p>Qualys also highlights the most critical vulnerabilities of 2024, with several severe issues just missing the top 10 list. These include CVE-2023-22527 (Atlassian Confluence), CVE-2023-48788 (FortiClient EMS), and CVE-2024-24919 (Check Point Security Gateways). All are listed on the CISA KEV, marking them as high-risk and demanding immediate attention.<\/p>\n\n\n\n<p>In light of these findings, Qualys advises adopting a hybrid vulnerability management strategy that integrates both agent-based and agent-less methods to effectively address and mitigate emerging threats. Regular updates and advanced threat detection systems are crucial for maintaining robust network security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Qualys Threat Research Unit (TRU) has revealed a significant [&hellip;]<\/p>\n","protected":false},"author":58,"featured_media":85459,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[9619],"tags":[314],"contributor":[9732],"class_list":["post-85456","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-top-stories","tag-cybersecurity-2","contributor-news-desk"],"featured_image_src":"https:\/\/techxmedia.com\/en\/wp-content\/uploads\/2024\/08\/05-05-2-e1723637507257.jpg","author_info":{"display_name":"Lubna","author_link":"https:\/\/techxmedia.com\/en\/author\/lubna\/"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/posts\/85456","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/users\/58"}],"replies":[{"embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/comments?post=85456"}],"version-history":[{"count":0,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/posts\/85456\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/media\/85459"}],"wp:attachment":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/media?parent=85456"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/categories?post=85456"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/tags?post=85456"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/contributor?post=85456"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}