The five most commonly exploited services in critical infrastructure sectors were File Transfer Protocol (FTP), Remote Desktop Protocol (RDP), Remote Procedure Call (RPC), Server Message Block (SMB), Internet Relay Chat (IRC).
January 1, 2025
Get the latest cybersecurity stats delivered to your inbox every week
Browse more stats from CISA or explore Exploitable services
Join 1,000+ security professionals getting weekly insights