Home Privacy How to prioritize patching in the exploit storm
Privacy - May 12, 2021

How to prioritize patching in the exploit storm

COVID made “flatten the curve” a household phrase in 2020, but did you know the concept also applies to vulnerability exploits? It turns out that what’s past is prologue in exploit trends. By tracking which attacks are being exploited the most, organizations discover important information to help proactively determine their vulnerability and risk. But it is also important to track attacks where activity has increased the most within a specified timeframe. It only takes one critical exploit to cause significant damage and, once inside the network, the attacker will need to move laterally and probably deploy additional exploits. That’s why understanding which exploits have the greatest likelihood of arriving on the network’s doorstep helps organizations prioritize patch management and risk assessment. This remains top of mind as cyber adversaries continue to maximize vulnerabilities, as we have recently seen with DearCry ransomware, for example.


Source link

Leave a Reply

Your email address will not be published. Required fields are marked *

Check Also

Fake DarkSide Ransomware Gang Targets Energy, Food Sectors

Attacker Sends Emails with False Claims of Compromise, Trend Micro SaysA fake cyber crime …