


SQL injection vulnerabilities are among most exploited flaws, despite the high level of awareness on the various techniques of hacking that exploit this category of bugs the impact of such attacks is very serious.Ī study released by the Ponemon Institute in October 2014 titled “ The SQL Injection Threat Study” investigated on the reply of organizations to the SQL injection threat.

The business impact of an Injection attack could be dramatic, especially when hacker compromise legacy systems and access internal data. The possible consequences of a cyber-attack that exploits an Injection flaw are data loss and consequent exposure of sensitive data, lack of accountability, or denial of access.Īn attacker could run an Injection attack to completely compromise the target system and gain control on it. The most popular injection vulnerabilities affect SQL, LDAP, XPath, XML parsers and program arguments.Īs explained in the OWASP “Top 10” guide, the injection flaws are quite easy to discover by analyzing the code, but frequently hard to find during testing sessions when systems are already deployed in production environments. Injection flaws are very common and affect a wide range of solutions. Injection vulnerabilities occur every time an application sends untrusted data to an interpreter. Let’s analyzed the top five cyber security vulnerabilities Injection vulnerabilities It is not a problem of maintenance of SCADA components, instead the lack of security by design for these systems expose the entire infrastructure to the risk of cyber-attacks. The majority of processes in modern infrastructure are controlled by SCADA systems that were exposed on the Internet for maintenance purposes without the necessary attention to the cyber security. The financial damage to the world economy due to cybercrime exceed 575 billion dollars, the figures are disconcerting if we consider that are greater than the GDP of many countries.Īnother danger posed by group of hackers on a global scale is represented by the possibility of cyber-attacks against critical infrastructure, such as gas pipelines, water facilities, and smart grids. Early this year, a criminal ring dubbed Carbanak cyber gang was discovered by the experts at Kaspersky Lab, the hackers have swiped over $1 Billion from banks worldwide

We cannot underestimate the action of cyber terrorists and cyber criminals, financial firms, retailers, and companies in the health care industry are constantly under attack. Recent events demonstrate that cyber espionage is still considered the most dangerous threat for Governments APT groups worldwide constantly search for vulnerabilities to exploit on a large scale in order to gather sensitive data. corporate secrets, personal information, and intellectual property) or to sabotage. Hackers act to steal sensitive data (i.e. Let’s try to think which could be the Top Five security vulnerabilities, in terms of potential for catastrophic damage.īefore listing the Top Five security vulnerabilities, let’s try to understand the possible motivation of a potential attacker. To do this it is essential to profile the threat actors, understand their motivation, learn the way they operate and adopt the necessary countermeasures, a very simple strategy to theorize, but very difficult to achieve.
