Back to Home

The five most commonly exploited services in critical infrastructure sectors were File Transfer Protocol (FTP), Remote Desktop Protocol (RDP), Remote Procedure Call (RPC), Server Message Block (SMB), Internet Relay Chat (IRC).

January 1, 2025

Source

View Original Report

Published on 1/1/2025

Share or Copy this stat

Want More Statistics Like This?

Get the latest cybersecurity stats delivered to your inbox every week

Related Statistics

Browse more stats from CISA or explore Exploitable services

Stay Ahead of Cyber Threats

Join 1,000+ security professionals getting weekly insights