Quantcast
Channel: BOT24
Viewing all articles
Browse latest Browse all 8064

Week to Weak: The Weaponization of Cyber Vulnerabilities

$
0
0
Key findings of this report include:
• Following the announcement of a vulnerability, it
takes a little more than a week for an associated
exploit to be detected on the open web, leaving
system administrators a small window of time to
evaluate and apply patches - if available.
• Java, Adobe Flash, and Internet Explorer produced
the greatest number of vulnerability/detected
exploit pairs.
• Microsoft Office exploits fester the longest before
the underlying vulnerability is detected.
• Evidence of Apple products exploitation appears
the quickest following the announcement of a
vulnerability.
• The difference between open source and proprietary
software exploitation is insignificant, somewhat
contradicting the popular “Linus law” that states
that “given enough eyeballs, all bugs are shallow

more here..........http://info.recordedfuture.com/Portals/252628/resources/week-to-weak-report.pdf

Viewing all articles
Browse latest Browse all 8064

Trending Articles