Skip to main content

Search site

Find podcasts, news, articles, webinars, and contributors in one search.

Microsoft tops CISA’s list of exploited CVEs used in ransomware attacks

Source: Cybersecurity Dive

Found this useful? Share it with your network

Ransomware attacks often exploit vulnerabilities, with 1/5 of common vulnerabilities used for such attacks, reports CISA. Microsoft product-linked vulnerabilities make up 2/5 of those exploited. Ransomware disrupts worldwide; organizations unaware of threat actors' vulnerabilities on their network. CISA addressing this through Ransomware Vulnerability Warning Pilot, under the 2022 Cyber Incident Reporting Act.

Read Full Article

Opens on Cybersecurity Dive