Expert Interview Trend 8 – Security Vulnerabilities in the Spotlight: From Corporate Hacks to Flawed Software Updates

What are the drivers for the still massive increase in vulnerabilities in 2024?

Several key factors have driven the massive increase in vulnerabilities in 2024. One major driver is the growing interconnectedness of Internet of Things (IoT) devices, cloud services, and distributed networks, which expands the attack surface and creates more potential entry points for cybercriminals. Additionally, organized cybercrime groups are actively testing software, solutions, and devices to uncover undisclosed vulnerabilities, often leveraging AI to accelerate this process. Another significant contributor is the widespread use of open-source software and the increasing complexity of software supply chains. Industries like the automotive sector, where numerous components rely on diverse software integrations, are particularly susceptible to vulnerabilities arising from these complexities. Together, these factors fuel the continued rise in security risks across digital ecosystems.

What types of vulnerabilities will be most common in 2025 and why?

The most common types of vulnerabilities include zero-day exploits, insecure cloud configurations, vulnerabilities in public APIs and remote code execution (RCE) attacks. This is because attackers are increasingly using poorly secured public-facing applications and APIs to gain access to networks

How can organisations effectively improve API or interface security?

APIs play a critical role in increasing security risks as they often serve as a gateway for attackers. Vulnerabilities arise from weak authentication and access controls, or from development and configuration errors due to a lack of systematic approach. Organisations can improve interface security by implementing API gateways, encryption and multi-factor authentication.

Which industries are most affected by the increasing number of security breaches?

Industries such as healthcare, finance and education are particularly affected. These sectors experience high attack rates, as sensitive data and critical systems that are vulnerable to ransomware attacks and zero-day exploits

How can risk-based vulnerability management help organisations effectively close these gaps?

Risk-based vulnerability management allows organisations to prioritise vulnerabilities according to their actual risk, rather than treating all vulnerabilities equally. This is a critical process and requires siginifcant resources to be effectively implemented. This helps to focus resources on the most serious threats, increasing the effectiveness of defences.

What role does employee training play in reducing vulnerabilities?

Employee training plays a key role in reducing vulnerabilities. Many attacks start with human error, such as phishing, as employees are not fully aware of the problem. Security awareness training helps to raise awareness and strengthen the cyber security culture in the organisation to minimise the risk of such incidents.

Employee training plays a key role in reducing vulnerabilities. Many attacks start with human error, such as phishing, as employees are not fully aware of the problem.

How is the increase in security breaches affecting organisations' overall IT security strategy?

The increase in security breaches is forcing organisations to adapt their IT security strategies by focusing on proactive security measures and the automation of security processes. In addition, zero-trust approaches and 24/7 monitoring and detection are becoming increasingly important.

What role will the EU Cyber Resilience Act play in reducing security vulnerabilities in products with a 'digital element'?

The EU Cyber Resilience Act will help reduce security vulnerabilities in products with digital elements by setting strict requirements for product security and regular updates. Security by design will become mandatory, meaning that products will have to be built with strong security features from the outset.

Want to check our facts and figures? Here they are:

2024 Midyear Threat Landscape Review - Qualys Security Blog

2024 Cybersecurity Trends: What’s Observable Already? - Qualys Security Blog

2024 Data Breach Investigations Report: Vulnerability - GlobeNewswire

The rise of AI threats and cybersecurity: predictions for 2024 - World Economic Forum

Do you want to close your security gaps? We're happy to help!

For more information, please get in touch with our experts.

For more information, please get in touch with our experts.

We would be happy to provide you with a non-binding offer.