Stormshield Barometer: 1,175 vulnerabilities analysed in 2015  

Simply opening a file or viewing a website can be enough for malware to infect a computer. Which were the most frequent types of attack in 2015 and how severe were they? The first Vulnerabilities Barometer produced by Stormshield reveals the year’s major trends. 

Stormshield found that most of the 1,175 vulnerabilities analysed affected the most common software programs. The most frequent target was Adobe Flash, with 325 attacks, followed by Google Chrome (184 attacks) and Mozilla Firefox (162 attacks).

Attacks are becoming increasingly widespread and virulent. In fact, Stormshield’s analysis found that 71% of attacks were “critical” and allowed the hackers to take control of the computer, while 2% of so-called “weak” vulnerabilities could result in a denial of service.

Finally, the analysis of the different types of attack show that 60% of them resulted in the computer’s memory being corrupted, 16% caused access restrictions and 10% gave the hackers access to  information stored on the computer.

Stormshield Endpoint Security is designed not only to recognise malicious programs, but also to disable their payloads: in 2015, it proactively blocked 100% of the critical vulnerabilities released.

As well as identifying and blocking existing or zero-day vulnerabilities, Stormshield Endpoint Security  issues reports setting out recommendations and indicating the changes required to improve businesses’ security policy.

The Barometer was based on the vulnerabilities analysed and blocked by Stormshield in 2015.

Share on