There’s an old saying that you wait ages for a bus, and then several come at once.
A growing trend is the mass exploitation of a critical vulnerability in a product, followed shortly after by further critical vulnerabilities (and often ‘in-the-wild’ exploitation) in the same product. Organisations will have worked hard to push out-of-band patches for the initial vulnerability, only to have to repeat the process later when new vulnerabilities appear.
In this blog, we’ll explore the factors driving this, and explain how organisations can better protect the software they’ve just patched from exploitation of future vulnerabilities.
Original Source: ncsc[.]gov[.]uk
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon using the button below
To keep up to date follow us on the below channels.