Week to Weak: Weaponization of Vulnerabilities

Week to Weak: Weaponization of Vulnerabilities

We conducted research into how quickly vulnerabilities are turned into detected exploits and and categorized the results by products and technologies. We used 188 vulnerability/exploit pairs as our dataset, based on Open-Source Intelligence (OSINT) information culled from the open web.

Presented by