A report from Recorded Future showed that in 2018 the top 10 most exploited vulnerabilties were from Microsoft. This episode talks about this report and why knowing what exploits the hackers are using more than others is an important component to a successful security program.
The top 10 exploited vulnerability report.
Be aware, be safe.
*** Support the podcast with a cup of coffee *** - https://www.ko-fi.com/securityinfive”>Ko-Fi Security In Five
Don't forget to subscribe to the https://binaryblogger.us7.list-manage.com/subscribe?u=a2d5b12eccff9f58f628a6ffd&id=3b642a1a4d" target="_blank" rel="noopener">Security In Five Newsletter.
—————— Where you can find Binary Blogger ——————“https://www.reddit.com/r/SecurityInFive”>Security In Five Reddit Channel r/SecurityInFive
>Binary Blogger Website“http://securityinfive.libsyn.com”>Security In Five Podcast Page -
http://securityinfive.libsyn.com/rss”>Podcast RSS Twitter @binaryblogger >iTunes, href="https://www.youtube.com/binaryblogger”>YouTube, https://beta.tunein.com/radio/Security-In-Five-p1017373/“>TuneIn, “https://www.iheart.com/podcast/security-in-five-podcast-28419123/“>iHeartRadio, “ https://open.spotify.com/show/4WK2SDAIdNg5Ay98bXIIHB”>Spotify, https://www.stitcher.com/podcast/binary-blogger/security-in-five?refid=stpr”>StitcherEmail - “mailto:bblogger@protonmail.com”>bblogger@protonmail.com