
Ransomware in Colombia. An accidental data exposure. Cyberespionage hits unpatched systems. An attack on IT systems disrupts industrial production. Bots and bad actors.
CyberWire Daily
00:00
Vulnerabilities and Exploitabilities
This chapter discusses the difference between vulnerabilities and exploitabilities in cyber attacks, emphasizing the need to prioritize the remediation of exploitable vulnerabilities. It also explores the evolving nature of vulnerabilities and exploitation techniques over time, and the importance of constantly evaluating and reevaluating the attack surface. Additionally, it examines the issue of domain registration abuse and suggests implementing measures to reduce abuse.
Transcript
Play full episode