Episode 457 – Why You Need To Update Regularly, Microsoft Dominates 2018 Most Exploited List

A report from Recorded Future showed that in 2018 the top 10 most exploited vulnerabilties were from Microsoft. This episode talks about this report and why knowing what exploits the hackers are using more than others is an important component to a successful security program. 

The top 10 exploited vulnerability report.

<p>Be aware, be safe.</p>
<p>*** Support the podcast with a cup of coffee *** – <a href=”https://www.ko-fi.com/securityinfive“>Ko-Fi Security In Five</a>
<p>Don’t forget to subscribe to the <a href=”https://binaryblogger.us7.list-manage.com/subscribe?u=a2d5b12eccff9f58f628a6ffd&id=3b642a1a4d” target=”_blank” rel=”noopener”>Security In Five Newsletter.</a></p>
<p>—————— Where you can find Binary Blogger —————— </p>
<p><a href=“https://www.reddit.com/r/SecurityInFive”>Security In Five Reddit Channel r/SecurityInFive</A></p>
<p><a href=”https://binaryblogger.com/>Binary Blogger Website</a></p>
<p><a href=http://securityinfive.libsyn.com>Security In Five Podcast Page</a> – <a href=”http://securityinfive.libsyn.com/rss>Podcast RSS</a></p>
<p><a href=”https://www.twitter.com/binaryblogger”>Twitter @binaryblogger</a></p>
<p><a href=”https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2>iTunes</a>, 
<a href=”https://www.youtube.com/binaryblogger”>YouTube</a>,

<p>Email -&nbsp;<a href=mailto:bblogger@protonmail.com>bblogger@protonmail.com</a></p>

Check out this episode!

Please follow and like us:
Pin Share

Become a Patron!

Follow me on Twitter


Member of The Internet Defense League

Enjoy this blog? Please spread the word :)

Follow by Email