Cybersecurity Threats and Vulnerabilities Guide
Cybersecurity Threats and Vulnerabilities Guide
CPE 524
Computer and Network Security
Learning Objectives
Lecture Outline
7 Malware Types
$4.67M 52%
Healthcare sector targeted in major
Global average cost of data breach
breaches
34% 2x
Incidents attributed to ransomware
Supply chain attacks doubled since 2024
attacks
Frameworks to categorize cyber threats based on source, intent, method, and impact:
Assess threats using Identify, Protect, Detect, Tampering - Modifying data/system maliciously
Respond, Recover Repudiation - Denying responsibility for actions
Provides context for cybersecurity risk management Information disclosure - Data leaks/exposure
Other frameworks: MITRE ATT&CK, Cyber Kill Chain, Diamond Model (2025)
Threat actors are individuals or groups who conduct or have the intent to conduct malicious activities:
Cybercriminals
Critical Development: AI-augmented phishing and social engineering increasingly bypassing traditional security
measures
CPE 524: Computer and Network Security
Insider Threats
Security risks from individuals with legitimate access to an organization's systems and data
Cost per incident: $715,366 in 2025 Account for 56% of all insider incidents Growing by 47% since 2023
Software Vulnerabilities
Impact Statistic
64% of all breaches in 2025 leverage some form of software vulnerability, with
38% specifically targeting unpatched code-based weaknesses.
CPE 524: Computer and Network Security
Network Vulnerabilities
TCP/IP vulnerabilities (SYN flood, session hijacking) Legacy systems with unpatched vulnerabilities
Weak encryption algorithms (46% of IoT devices) Average time to detect: 208 days (2025)
Configuration Vulnerabilities
2025 Impact: 63% of data breaches involve configuration errors, with cloud misconfigurations being the fastest growing
category (↑27% since 2024)
Common Vulnerability Scoring System (CVSS) provides a standardized framework for rating the severity of security
vulnerabilities
Higher scores indicate greater severity and should be prioritized for remediation
CVSS v4.0 (2024) improved scoring for supply chain & multi-system scenarios
CPE 524: Computer and Network Security
Zero-Day Vulnerabilities
Definition: Previously unknown vulnerabilities with no available patches that attackers can exploit before
defenders have an opportunity to develop countermeasures
2025 Market Dynamics: Zero-day exploits trading for $500K-$5M on dark web markets, with premium prices
for critical infrastructure targets
Rising Trend: 432 new zero-days identified in first half of 2025 (VulnCheck data), representing 38% increase
over previous year
Notable Examples: Apple iOS/macOS (actively exploited), Microsoft Exchange, PDF-XChange Editor (CVE-
2025-6662)
"Harvest Now, Decrypt Later" Attacks: Quantum computing risks driving collection of encrypted data for
future decryption
Responsible Disclosure: Security researchers actively working with vendors via coordinated vulnerability
disclosure programs
CPE 524: Computer and Network Security
What is Malware?
Malicious software designed to damage, disrupt, or gain
unauthorized access to systems. Modern malware landscape
includes viruses, worms, trojans, ransomware, spyware, and
emerging AI-powered threats.
Key Differences:
Virus: Requires host file, needs user activation
Worm: Self-sufficient, autonomous propagation
Trojan: No self-replication, relies on deception
CPE 524: Computer and Network Security
$4.2M 87%
Ransomware now uses double extortion
Average ransom demand in 2025
tactics
65% 73%
Surge in healthcare ransomware attacks Attacks now target cloud backups first
Infostealers Cryptojackers
Designed to harvest credentials, cryptocurrency wallets, Hijack computing resources to mine cryptocurrency.
and browser data. 2025 variants: Raccoon, RedLine, Vidar. Notable 2025 increase in cloud infrastructure targeting
Major threat in credential markets. (48% growth). Causes performance degradation and
increased costs.
Trend for 2025: 78% of advanced malware now employs multiple techniques (e.g., fileless delivery + infostealing +
persistence via rootkit)
k
CPE 524: Computer and Network Security
The OWASP Top 10 represents the most critical web application security risks in 2025:
3. Broken Authentication
Session management and authentication flaws allowing account 6-10. Additional Critical Risks
compromise • Insecure Deserialization
Often exploited via credential stuffing attacks • Security Misconfiguration
• XML External Entities (XXE)
• Broken Access Control
• Server-Side Request Forgery (SSRF)
CPE 524: Computer and Network Security
Baiting: Offering something enticing to entrap the Voice Cloning: 442% rise in voice phishing with
victim cloned voices
Scareware: Frightening users into taking harmful Deepfakes: Executive video impersonation causing
actions $45M in losses
Quid Pro Quo: Offering a service in exchange for Target Shift: 39% of incidents now targeting mid-
information level employees
Why So Effective? Nearly all (98%) social engineering attacks exploit human psychology rather than technical
vulnerabilities. Human-targeted defenses are essential in 2025.
CPE 524: Computer and Network Security
442% 82%
Increase in voice phishing (vishing) Of enterprises report AI-enhanced
attacks phishing
53% 67%
Increase in SMS phishing (smishing) Cannot distinguish deepfakes from real
attacks people
How attackers target systems and the methodical approach they follow
7 Actions on Objectives
Achieving attacker goals (data theft, encryption)
CPE 524: Computer and Network Security
Attack Vector: Compromised contractor credentials Attack Vector: Unpatched vulnerability exploitation
Impact: Network configurations stolen by Chinese APT Impact: 360,000 patient records compromised
Date: July 17, 2025 Date: March 2025
Lesson: Third-party access requires strict Lesson: Timely patching and HIPAA compliance
monitoring and MFA remains critical
52% $4.2M+
of major breaches targeted healthcare Average ransomware demand in
sector in 2025 healthcare
9 Days 67%
of affected facilities paid ransom to restore
Average systems downtime after attack
services
22 of 24 37%
Industry sectors affected by supply chain Rise in software dependency poisoning
attacks attacks
3.2M 149%
Records exposed in Palo Alto/Zscaler Increase in open-source supply chain
incident exploits
A systematic process for evaluating potential security risks by identifying threats, vulnerabilities, and their potential impact.
Identify malicious behaviors and infection vectors VirusTotal: Multi-engine malware scanning platform
Create YARA rules to detect similar malware variants YARA: Pattern matching tool for malware
identification
Generate detailed analysis reports with IOCs
Prerequisites: VM with 8GB RAM, Labtainer
environment
Important: This lab will be conducted in an isolated network environment. All activities are for educational purposes
only. Lab report submission due one week after the session.
CPE 524: Computer and Network Security
Prepare for next week's lab session by reviewing the provided resources Next Steps →
Which threat actors do you think pose the greatest risk to Nigerian organizations in
2025?
Share your experiences with security incidents or social engineering attempts you've
encountered
How might AI-powered threats change our approach to defensive security in 2025-
2026?
Open Q&A: Feel free to ask questions about any topic covered in today's lecture Ask Now
CPE 524: Computer and Network Security