A public exploit for BlueKeep has not yet been released, but a number of researchers have developed proofs-of-concept exploiting the Remote Desktop Protocol (RDP) vulnerability. Time may be running out for organizations that have still not applied Microsoft's patch.
From an attacker’s perspective, the wider the net cast, the more number of potential victims caught. So it’s no surprise that Recorded Future research indicates attackers continue to rely heavily on exploits targeting Microsoft applications.
With a 9.8 rating on the Common Vulnerability Scoring System, the privilege escalation flaw in container orchestration system Kubernetes is as bad as it can get. Any user will be able to remotely gain full administrator privileges on any node in the cluster.
The WordPress security team has a tough job: regularly fixing security issues found in the most popular CMS while providing users with the tools to make sure they aren't running older vulnerable code.
Armchair risk analysis frequently defaults to "patch all the things," but the data shows that trying to chase after every vulnerability isn't always the best strategy for a CISO. How should CISOs look at Kenna Security and Cyentia Institute's research on what kind of patching model works best?