{"id":848,"date":"2024-05-15T06:00:00","date_gmt":"2024-05-15T13:00:00","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=848"},"modified":"2025-03-13T10:59:42","modified_gmt":"2025-03-13T17:59:42","slug":"the-biggest-security-nightmares-from-2023-and-how-they-could-ruin-your-2024","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/the-biggest-security-nightmares-from-2023-and-how-they-could-ruin-your-2024\/","title":{"rendered":"The Biggest Security Nightmares from 2023 and How They Could Ruin Your 2024"},"content":{"rendered":"\n<p>It feels like the number of security issues affecting vital internet-exposed assets is never-ending. No one can predict the next big vulnerability. But exposure management techniques can help prepare your organization for a wide range of issues by identifying, validating, and mobilizing your response to emerging threats. These processes also include validating fixes and issues, a well-documented mobilization process, and automatic scanning for high value assets.&nbsp;<\/p>\n\n\n\n<p>Here are five types of issues that security teams should be aware of, along with exposure management solutions that can mitigate those risks.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"628\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/MOVEiT.png\" alt=\"\" class=\"wp-image-852\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/MOVEiT.png 1200w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/MOVEiT-512x268.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/MOVEiT-768x402.png 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure><\/div>\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Cracked Safe: MOVEit<\/h2>\n\n\n\n<p><strong>Issue:<\/strong> A SQL injection vulnerability affecting MOVEit Transfer\u2019s secure file transfer protocol (SFTP) web application (CVE-2023-34362) exposed data for thousands of organizations even after the patch was introduced in June 2023. Our research indicates that over 50% of attempted patches require multiple rounds of validation before the patch is successful, often because of incomplete or inaccurately followed remediation instructions. If organizations are not automatically validating fixes, sensitive assets may be left unpatched for months or years.<br><br><strong>Solution: <\/strong>Because remediation processes can be complex and evolve as new details about issues are discovered, organizations must automate the remediation review process in order to maintain pace.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"627\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/LOG4J.png\" alt=\"\" class=\"wp-image-853\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/LOG4J.png 1200w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/LOG4J-512x268.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/LOG4J-768x401.png 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure><\/div>\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Zombie: Log4J<\/h2>\n\n\n\n<p><strong>Issue: <\/strong>Even though CVE-2021-44228 was first identified in 2021, some organizations still haven\u2019t patched this remote code execution (RCE) vulnerability. <strong>CyCognito found that 2% of organizations still have assets vulnerable to Log4J. The average organization took 24 days to remediate this vulnerability.&nbsp;<\/strong><\/p>\n\n\n\n<p><strong>Solution: <\/strong>Unpatched assets linger on the attack surface for two primary reasons: lack of awareness of the asset and poor internal processes for fixing issues. Security teams must develop automated processes to identify all assets and then to mobilize fixes on the most important issues. Without it, they will find themselves falling victim to these zombie vulnerabilities long after they\u2019re out of the news.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"628\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CITRIXBLEED.png\" alt=\"\" class=\"wp-image-854\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CITRIXBLEED.png 1200w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CITRIXBLEED-512x268.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CITRIXBLEED-768x402.png 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure><\/div>\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Open Door: CitrixBleed<\/h2>\n\n\n\n<p><strong>Issue: <\/strong>Thousands of servers around the world remain vulnerable to the CitrixBleed vulnerability, CVE-2023-4966, sometimes even after patches were applied. Affiliates of the Ransomware-as-a-Service group Lockbit 3.0 and AlphV\/BlackCat have leveraged this vulnerability to compromise Fortune 100 organizations and financial institutions, stealing data and encrypting files.&nbsp;<\/p>\n\n\n\n<p><strong>Solution: <\/strong>Vulnerabilities with this level of impact require targeted threat intelligence to stay informed as the situation evolves, as well as processes that validate if attempted fixes were successful.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"628\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/DarkBeam.png\" alt=\"\" class=\"wp-image-855\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/DarkBeam.png 1200w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/DarkBeam-512x268.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/DarkBeam-768x402.png 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure><\/div>\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Treasure Trove: DarkBeam<\/h2>\n\n\n\n<p><strong>Issue: <\/strong>An unprotected Elasticsearch and Kibana interface belonging to the digital protection company DarkBeam exposed over 3.8 billion records of personally identifiable information (PII) in September 2023, including hundreds of millions of login credentials. <strong>Our research indicates that 7% of web apps contain PII fields and could potentially expose PII <\/strong>.&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>Solution: <\/strong>Automatically scanning for forgotten or unmonitored interfaces that lack password protection or contain PII can identify these types of treasure troves as soon as they\u2019re exposed.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"628\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/JuniperNetworks.png\" alt=\"\" class=\"wp-image-857\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/JuniperNetworks.png 1200w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/JuniperNetworks-512x268.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/JuniperNetworks-768x402.png 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure><\/div>\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Weak Link in the Supply Chain: Juniper Networks<\/h2>\n\n\n\n<p><strong>Issue: <\/strong>When Juniper Networks misconfigured their Salesforce installation, they not only exposed their own data, but also put their customers\u2019 data at risk. This error allowed attackers to identify device and support contract information for organizations that were no longer Juniper customers but still had active devices, indicating that those devices were no longer receiving security updates.&nbsp;<\/p>\n\n\n\n<p><strong>Solution:<\/strong> Organizations must be able to quickly mobilize in response to security issues that affect not only themselves but also their third party suppliers or their third party\u2019s third party. Security teams also need prompt awareness of devices that are no longer receiving security updates so that they can be taken offline or otherwise protected from attackers. A well-implemented mobilization process reduces friction between impacted IT security teams and accelerates MTTR.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Take Action<\/h2>\n\n\n\n<p>Comprehensive exposure management requires continuous monitoring for new assets and actively testing vulnerabilities that could put your organization at risk.<\/p>\n\n\n\n<p>As the catalog of vulnerabilities grows, security teams must use systemic processes to stay ahead of attackers. Continuous monitoring of assets, networks, and systems allows vulnerabilities to be swiftly identified and remediated, while integrated validation and context foster collaboration between security analysts, IT teams, and stakeholders.&nbsp;<\/p>\n\n\n\n<p>CyCognito is an exposure management platform that reduces risk by discovering, testing and prioritizing security issues. The platform tests billions of websites, cloud applications and APIs and uses advanced AI to identify the most critical risks and guide remediation. Emerging companies, government agencies and Fortune 500 organizations rely on CyCognito to secure and protect from growing threats. For more information, visit <a href=\"https:\/\/www.cycognito.com\/demo\">cycognito.com\/demo<\/a>.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/www.cycognito.com\/documents\/infographics\/infographic-security-nightmares-of-2023-and-how-to-avoid-them-in-2024.webp\" alt=\"\"\/><\/figure><\/div>","protected":false},"excerpt":{"rendered":"<p>CyCognito shares insights showing how security teams can learn from previous incidents and leverage exposure management techniques to stay ahead of attackers. <\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[229,3],"tags":[33,51,20,79],"class_list":["post-848","post","type-post","status-publish","format-standard","hentry","category-featured","category-research","tag-exposure-management","tag-external-exposure-management","tag-infographic","tag-log4j"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Biggest Security Nightmares from 2023 and How They Could Ruin Your 2024 | CyCognito Blog<\/title>\n<meta name=\"description\" content=\"CyCognito shares insights showing how security teams can learn from previous incidents and leverage exposure management techniques to stay ahead of attackers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/the-biggest-security-nightmares-from-2023-and-how-they-could-ruin-your-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Biggest Security Nightmares from 2023 and How They Could Ruin Your 2024\" \/>\n<meta property=\"og:description\" content=\"CyCognito shares insights showing how security teams can learn from previous incidents and leverage exposure management techniques to stay ahead of attackers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/the-biggest-security-nightmares-from-2023-and-how-they-could-ruin-your-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-15T13:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-13T17:59:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/banner-blog-2024-05-16-2400x1256-email.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"1256\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Emma Zaballos\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Emma Zaballos\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/the-biggest-security-nightmares-from-2023-and-how-they-could-ruin-your-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/the-biggest-security-nightmares-from-2023-and-how-they-could-ruin-your-2024\/\"},\"author\":{\"name\":\"Emma Zaballos\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/42c314196e7f096a74bd885693643d58\"},\"headline\":\"The Biggest Security Nightmares from 2023 and How They Could Ruin Your 2024\",\"datePublished\":\"2024-05-15T13:00:00+00:00\",\"dateModified\":\"2025-03-13T17:59:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/the-biggest-security-nightmares-from-2023-and-how-they-could-ruin-your-2024\/\"},\"wordCount\":759,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/the-biggest-security-nightmares-from-2023-and-how-they-could-ruin-your-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/MOVEiT.png\",\"keywords\":[\"Exposure Management\",\"External Exposure Management\",\"Infographic\",\"Log4j\"],\"articleSection\":[\"Featured\",\"Research\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/the-biggest-security-nightmares-from-2023-and-how-they-could-ruin-your-2024\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/the-biggest-security-nightmares-from-2023-and-how-they-could-ruin-your-2024\/\",\"name\":\"The Biggest Security Nightmares from 2023 and How They Could Ruin Your 2024 | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/the-biggest-security-nightmares-from-2023-and-how-they-could-ruin-your-2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/the-biggest-security-nightmares-from-2023-and-how-they-could-ruin-your-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/MOVEiT.png\",\"datePublished\":\"2024-05-15T13:00:00+00:00\",\"dateModified\":\"2025-03-13T17:59:42+00:00\",\"description\":\"CyCognito shares insights showing how security teams can learn from previous incidents and leverage exposure management techniques to stay ahead of attackers.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/the-biggest-security-nightmares-from-2023-and-how-they-could-ruin-your-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/the-biggest-security-nightmares-from-2023-and-how-they-could-ruin-your-2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/the-biggest-security-nightmares-from-2023-and-how-they-could-ruin-your-2024\/#primaryimage\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/MOVEiT.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/MOVEiT.png\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/the-biggest-security-nightmares-from-2023-and-how-they-could-ruin-your-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Biggest Security Nightmares from 2023 and How They Could Ruin Your 2024\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/42c314196e7f096a74bd885693643d58\",\"name\":\"Emma Zaballos\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7ff812a5ab34a955a1e815e6719c68a7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7ff812a5ab34a955a1e815e6719c68a7?s=96&d=mm&r=g\",\"caption\":\"Emma Zaballos\"},\"description\":\"Product Marketing Manager\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/emma-zaballos\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Biggest Security Nightmares from 2023 and How They Could Ruin Your 2024 | CyCognito Blog","description":"CyCognito shares insights showing how security teams can learn from previous incidents and leverage exposure management techniques to stay ahead of attackers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/the-biggest-security-nightmares-from-2023-and-how-they-could-ruin-your-2024\/","og_locale":"en_US","og_type":"article","og_title":"The Biggest Security Nightmares from 2023 and How They Could Ruin Your 2024","og_description":"CyCognito shares insights showing how security teams can learn from previous incidents and leverage exposure management techniques to stay ahead of attackers.","og_url":"https:\/\/www.cycognito.com\/blog\/the-biggest-security-nightmares-from-2023-and-how-they-could-ruin-your-2024\/","og_site_name":"CyCognito Blog","article_published_time":"2024-05-15T13:00:00+00:00","article_modified_time":"2025-03-13T17:59:42+00:00","og_image":[{"width":2400,"height":1256,"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/banner-blog-2024-05-16-2400x1256-email.png","type":"image\/png"}],"author":"Emma Zaballos","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Emma Zaballos","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/the-biggest-security-nightmares-from-2023-and-how-they-could-ruin-your-2024\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/the-biggest-security-nightmares-from-2023-and-how-they-could-ruin-your-2024\/"},"author":{"name":"Emma Zaballos","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/42c314196e7f096a74bd885693643d58"},"headline":"The Biggest Security Nightmares from 2023 and How They Could Ruin Your 2024","datePublished":"2024-05-15T13:00:00+00:00","dateModified":"2025-03-13T17:59:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/the-biggest-security-nightmares-from-2023-and-how-they-could-ruin-your-2024\/"},"wordCount":759,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/the-biggest-security-nightmares-from-2023-and-how-they-could-ruin-your-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/MOVEiT.png","keywords":["Exposure Management","External Exposure Management","Infographic","Log4j"],"articleSection":["Featured","Research"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/the-biggest-security-nightmares-from-2023-and-how-they-could-ruin-your-2024\/","url":"https:\/\/www.cycognito.com\/blog\/the-biggest-security-nightmares-from-2023-and-how-they-could-ruin-your-2024\/","name":"The Biggest Security Nightmares from 2023 and How They Could Ruin Your 2024 | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/the-biggest-security-nightmares-from-2023-and-how-they-could-ruin-your-2024\/#primaryimage"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/the-biggest-security-nightmares-from-2023-and-how-they-could-ruin-your-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/MOVEiT.png","datePublished":"2024-05-15T13:00:00+00:00","dateModified":"2025-03-13T17:59:42+00:00","description":"CyCognito shares insights showing how security teams can learn from previous incidents and leverage exposure management techniques to stay ahead of attackers.","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/the-biggest-security-nightmares-from-2023-and-how-they-could-ruin-your-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/the-biggest-security-nightmares-from-2023-and-how-they-could-ruin-your-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/the-biggest-security-nightmares-from-2023-and-how-they-could-ruin-your-2024\/#primaryimage","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/MOVEiT.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/MOVEiT.png","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/the-biggest-security-nightmares-from-2023-and-how-they-could-ruin-your-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Biggest Security Nightmares from 2023 and How They Could Ruin Your 2024"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/42c314196e7f096a74bd885693643d58","name":"Emma Zaballos","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7ff812a5ab34a955a1e815e6719c68a7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7ff812a5ab34a955a1e815e6719c68a7?s=96&d=mm&r=g","caption":"Emma Zaballos"},"description":"Product Marketing Manager","url":"https:\/\/www.cycognito.com\/blog\/author\/emma-zaballos\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/848","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=848"}],"version-history":[{"count":7,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/848\/revisions"}],"predecessor-version":[{"id":864,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/848\/revisions\/864"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=848"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=848"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=848"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}