IBM: Websites are 'Achilles' heel' of business security
By the end of 2008, more than half of all vulnerabilities disclosed during the year had no vendor-supplied patch.
Businesses are unwittingly becoming the biggest threat to their own customers, as criminals use legitimate websites as a launching pad against consumers.
This is according to IBM, which called websites the "Achilles' heel" for corporate IT security thanks to attackers focusing on web applications to infect end-user machines. Corporations were also making it worse by using "off-the-shelf" web applications which carried vulnerabilities.
In the Annual IBM X-Force Report, Big Blue said that more than half of all vulnerabilities were related to web applications, and of these, more than 74 per cent had no patch. By the end of 2008, 53 per cent of all vulnerabilities had no vendor-approved patch.
The vulnerabilities meant that the large scale SQL vulnerabilities which emerged in early 2008 were able to continue to grow in size throughout the year.
By the end of 2008 the volume of SQL attacks had jumped by 30 times the number of attacks seen in the summer.
"The purpose of these automated attacks is to deceive and redirect web surfers to web browser exploit toolkits," said Kris Lamb, of X-Force Research and Development, in a statement.
"This is one of the oldest forms of mass attack still in existence today. It is staggering that we still see SQL injection attacks in widespread use without adequate patching almost 10 years after they were first disclosed."
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
He added: "Cybercriminals target businesses because they provide an easy target to launch attacks against anyone that visits the web."
IBM also said that the security industry needed to realise that cybercriminals were motivated by money, and fully consider how attackers balanced the economic opportunity of vulnerability against the costs of exploitation.
Lamb said: "If the security industry can better understand the motivations of computer criminals, it can do a better job of determining when emergency patching is most needed in the face of immediate threats."
-
What does modern security success look like for financial services?Sponsored As financial institutions grapple with evolving cyber threats, intensifying regulations, and the limitations of ageing IT infrastructure, the need for a resilient and forward-thinking security strategy has never been greater
-
Yes, legal AI. But what can you actually do with it? Let’s take a look…Sponsored Legal AI is a knowledge multiplier that can accelerate research, sharpen insights, and organize information, provided legal teams have confidence in its transparent and auditable application
-
Put AI to work for IT operationswhitepaper Reduce the cost and complexity of managing hybrid applications
-
AI in the retail industry is spreading beyond the IT departmentNews AI has become a strategic imperative for retailers, delivering marked productivity gains
-
Maximizing contact center operations with generative AI assistants backed by responsible AI principleswhitepaper Reduce the cost and complexity of managing hybrid applications
-
IBM just launched powerful new open source AI models – here’s what you need to knowNews Available under the Apache 2.0 license, IBM's Granite 3.0 models are trained on enterprise data and can out-perform the competition
-
Achieving business outcomes with generative AIWebinar Take your hybrid cloud journey to the next level with generative AI
-
Wimbledon’s new Catch Me Up AI feature promises to keep fans up to date at the tournament – after it irons out some of the wrinklesNews The latest feature to come out of IBM’s partnership with Wimbledon will keep fans engaged from the early stages right through to the final with dynamic player insights
-
AI demands new ways of data managementwhitepaper The data leader’s guide for how to leverage the right databases for applications, analytics and generative AI
-
AI governance for responsible transparent and explainable AI workflowswhitepaper Build greater trust in your AI