After years of writing viruses and worms for operating systems andsoftware running on Internet servers, hackers found some new areas totarget in 2005, according to an influential report on security trendsset to be published Tuesday.Over the past year, attackers have been switching their focus tonetwork devices, backup software and even the security softwaredesigned to protect computers, according to the 2005 SANS Top 20 listof the most critical Internet security vulnerabilities, said AlanPaller, director of research with the SANS Institute, a trainingorganization for computer security professionals.“In the past 12 to 15 months… attackers have made a massive shift toattack applications,” Paller said in an e-mail interview. “Automatedpatching started making it harder to find new vulnerable systems, sothey went after applications that users are just not patching.”“Other more sophisticated attackers, looking for new targets, foundthey could use vulnerabilities in network devices to set up listeningposts where they could collect critical information that would get theminto the sites they wanted,” he added. The SANS Top 20 list has been published annually since 2000. It iscompiled by representatives from a variety of computer securityorganizations including the U.S. Computer Emergency Response Team(US-CERT), the British Government’s National Infrastructure SecurityCo-Ordination Centre (NISCC) and the SANS Internet Storm Center.The list is designed to give security professionals a quick sense ofthe industry’s consensus on which commonly targeted securityvulnerabilities require their most immediate attention. It hastraditionally focused on Windows and Unix vulnerabilities, as well asproblems with some server-side applications. The focus on new client applications and networking products hashappened because so many server-side and operating system bugs havebeen fixed, forcing security researchers to look elsewhere for bugs,said Gerhard Eschelbeck, chief technology officer and vice president ofengineering with Qualys Inc., and a contributor to this year’s list. “Alot of the low-hanging fruit has been identified now,” he said. “Wereally reached a tipping point earlier this year, where people startedto look aggressively at client-side applications.”Security researchers also started looking at vulnerabilities innetworking products, thanks in part to a controversial presentation bysecurity researcher Michael Lynn at this year’s Black Hat 2005conference in Las Vegas. Cisco Systems Inc. sued Lynn after hediscussed security problems in the Internetwork Operating System (IOS)software that is used by Cisco’s routers.Networking products appeared on the SANS list for the first time thisyear, with Cisco vulnerabilities taking three of the 20 slots. The listalso includes nine common application vulnerabilities, two Unixproblems and six Windows issues, all of which “deserve immediateattention from security professionals,” according to SANS.When it is published Tuesday, the SANS Top 20 will be visible here.By Robert McMillan – IDG News Service (San Francisco Bureau) Related content news Okta launches Cybersecurity Workforce Development Initiative New philanthropic and educational grants aim to advance inclusive pathways into cybersecurity and technology careers. By Michael Hill Oct 04, 2023 3 mins IT Skills Careers Security news New critical AI vulnerabilities in TorchServe put thousands of AI models at risk The vulnerabilities can completely compromise the AI infrastructure of the world’s biggest businesses, Oligo Security said. By Shweta Sharma Oct 04, 2023 4 mins Vulnerabilities news ChatGPT “not a reliable” tool for detecting vulnerabilities in developed code NCC Group report claims machine learning models show strong promise in detecting novel zero-day attacks. By Michael Hill Oct 04, 2023 3 mins DevSecOps Generative AI Vulnerabilities news Google Chrome zero-day jumps onto CISA's known vulnerability list A serious security flaw in Google Chrome, which was discovered under active exploitation in the wild, is a new addition to the Cybersecurity and Infrastructure Agency’s Known Exploited vulnerabilities catalog. By Jon Gold Oct 03, 2023 3 mins Zero-day vulnerability Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe