", along with traffic change from september. targeting trends to understand how attacker targeting in october contrasted with the rest of 2022, see figure 2. continuing the visualization approach that we began with august data, these eleven vulnerabilities represent the top 5 for …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1190Exploit Public-Facing Application
46%
"cve - 2020 - 8958. identifying rapid growth as we did for the september sis, we ’ ve plotted the volume of traffic over time for all of the vulnerabilities we ’ ve been tracking. in addition to highlighting periods of dramatic change in attacker activity, this plot also shows vul…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1588.006Vulnerabilities
45%
"cve - 2020 - 8958. identifying rapid growth as we did for the september sis, we ’ ve plotted the volume of traffic over time for all of the vulnerabilities we ’ ve been tracking. in addition to highlighting periods of dramatic change in attacker activity, this plot also shows vul…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1588.006Vulnerabilities
32%
", along with traffic change from september. targeting trends to understand how attacker targeting in october contrasted with the rest of 2022, see figure 2. continuing the visualization approach that we began with august data, these eleven vulnerabilities represent the top 5 for …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
We spotted a new Microsoft Exchange zero day and more security infrastructure vulns, as well as all of the usual suspects, in this month’s installment on vulnerability targeting.