Named: The Top 5 Vulns Behind a Ransomware Surge

Morally bankrupt hackers have been hiding in compromised networks for months waiting for the right moment to initiate ransomware attacks, and given the activation of a host of ransomware deployments in the first two weeks of April, a pandemic is clearly that commercial opportunity. An uptick in attacks at the beginning of April was recorded by the Microsoft Threat Protection Intelligence Team and reported this week, in a comprehensive blog that also names the top five vulnerabilities the team saw exploited by cyber criminals to gain an initial network foothold.

Read full article on CBR – CyberSecurity News

 


Date:

Categorie(s):