{"id":2016,"date":"2003-11-18T00:00:00","date_gmt":"2003-11-18T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/11\/18\/report-net-attacks-increasing\/"},"modified":"2021-12-30T11:40:29","modified_gmt":"2021-12-30T11:40:29","slug":"report-net-attacks-increasing","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/11\/18\/report-net-attacks-increasing\/","title":{"rendered":"Report: Net attacks increasing"},"content":{"rendered":"<p>Internet attacks are getting more numerous and menacing, network protection company Internet Security Systems concluded in a report released Tuesday.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The survey found that 725 new software flaws in the third quarter of this year, down slightly from 727 found in the second quarter.<\/p>\n<p>However, the 823 new worms and viruses that appeared between July 1 and September represented a 26 percent increase from the previous three months.<\/p>\n<p>&#8220;The window of time between vulnerability disclosure and the release of a working exploit continues to shrink, leaving enterprises with even less time to learn about and prevent attacks,&#8221; Chris Rouland, vice president of Internet Security Systems&#8217; vulnerability research team, said in a prepared statement.<\/p>\n<p>Security software maker Symantec also pointed to anecdotal evidence that the time was shrinking between the first public mention of details of a software flaw and the release of code exploiting the flaw.<\/p>\n<p>Three serious Internet attacks&#8211;MSBlast, MSBlast.D and SoBig.F&#8211;struck in August.<\/p>\n<p>The Computer Emergency Response Team (CERT) Coordination Center&#8217;s latest report indicates that the number of flaws that will appear in 2003 is likely to be smaller than in 2002.<\/p>\n<p>That&#8217;s a first: Between 1999 and 2002, the number of vulnerabilities recorded by CERT roughly doubled every year.<\/p>\n<p>More info: [url=http:\/\/news.com.com\/2100-7349_3-5108921.html?tag=nefd_top]http:\/\/news.com.com\/2100-7349_3-5108921.html?tag=nefd_top[\/url] and<br \/>\n[url=http:\/\/bvlive01.iss.net\/issEn\/delivery\/prdetail.jsp?oid=23118]http:\/\/bvlive01.iss.net\/issEn\/delivery\/prdetail.jsp?oid=23118[\/url]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2016","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2016","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2016"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2016\/revisions"}],"predecessor-version":[{"id":4503,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2016\/revisions\/4503"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2016"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2016"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2016"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}