Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Exploitable by Malware

by Cody Dumont
October 27, 2017

Developers of malware and other malicious code are creating new methods of exploiting systems on a daily basis. The proliferation of malware presents elevated cyber risk to all organizations. Malware often exploits vulnerabilities making software or hardware perform actions not originally intended. Vulnerabilities can also be widely exploited shortly after publication, as malware authors reverse engineer the fix and come up with “1-day exploits” that can be used to attack organizations. 

Developers of malware and other malicious code are creating new methods of exploiting systems on a daily basis. Tenable.io easily identifies the hosts most vulnerable to malware and other exploitation frameworks. This dashboard provides the necessary context to understand which assets are vulnerable to malware.  By supplying the context and associated metrics, the organization a can better communicate the cyber risk to the business.

Modern ransomware and malware are often built using an exploit framework, can be initially developed with the assistance of an exploit framework. This dashboard also provides some context with exploitability using frameworks such as CANVAS or Core Impact. 

Cyber Exposure is the next frontier for empowering organizations to accurately understand, represent and ultimately reduce their cyber risk against the rapidly changing modern attack surface. Organizations that embrace Cyber Exposure are learning a new discipline on how to manage and measure their cyber risk across traditional and non-traditional assets, such as container security, cloud services, and web applications. Knowing which areas of your business are secure or exposed, allows for more effective measurement of an organization’s Cyber Risk. For example, how much and where to invest to reduce risk to an acceptable amount and help drive strategic business decisions. 

Components

Exploitable Vulnerability Summary: This component displays a summary of vulnerabilities that are exploitable by malware

Exploitable Matrix: This component is an indicator matrix of exploitable vulnerabilities

Top 100 Vulnerabilities Exploitable by Malware: This component provides a host summary of systems with vulnerabilities that are known to be exploitable by malware

Top 100 Malware Vulnerable Hosts: This component provides a host summary of systems with vulnerabilities that are known to be exploitable by malware

Category: 
Fix
Try for Free Buy Now

Try Tenable.io Vulnerability Management

FREE FOR 60 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.