A report from Recorded Future showed that in 2018 the top 10 most exploited vulnerabilties were from Microsoft. This episode talks about this report and why knowing what exploits the hackers are using more than others is an important component to a successful security program.
The top 10 exploited vulnerability report.
<p>Be aware, be safe.</p>
<p>—————— Where you can find Binary Blogger —————— </p>
<p><a href=“https://www.reddit.com/r/SecurityInFive”>Security In Five Reddit Channel r/SecurityInFive</A></p>
<p><a href=”https://binaryblogger.com/“>Binary Blogger Website</a></p>
<p><a href=”https://www.twitter.com/binaryblogger”>Twitter @binaryblogger</a></p>
<p>Email - <a href=“mailto:firstname.lastname@example.org“>email@example.com</a></p>
Check out this episode!