

Attackers focused on exposed VPNs and firewalls using known vulnerabilities.
Source: CISA
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
Automated attacks will scan the internet for vulnerable devices within hours of new flaws being announced.