Vulnerability exploitation volumes up over 50% in 2022
Driven by significant cyber security disclosures affecting supply chain dependencies, such as Log4j and Realtek, threat actors have vastly increased their use of vulnerabilities as a means to work their way inside their victims’ systems, with vulnerability exploitation attempts per customer…
Source: www.computerweekly.com – Read more