Vulnerability exploitation volumes up over 50% in 2022

siteadmin June 8, 2023


Driven by significant cyber security disclosures affecting supply chain dependencies, such as Log4j and Realtek, threat actors have vastly increased their use of vulnerabilities as a means to work their way inside their victims’ systems, with vulnerability exploitation attempts per customer…

Source: www.computerweekly.comRead more