Vulernability

Do you have one of Vulnerable to the Top 8 Most Exploited Vulnerabilities?

The Most Exploited Vulnerabilities in 2016-2019 as Reported by the FBI.

It probably won't surprise you that 7 of the 8 most exploited software vulnerabilities are to be found in Microsoft products.

Their widespread use across organizations and institutions makes them an ideal candidate for cybercriminals. According to U.S. Government technical analysis, malicious cyber actors most often exploit vulnerabilities in Microsoft's Object Linking and Embedding (OLE) technology. OLE allows documents to contain embedded content from other applications such as spreadsheets. But also Adobe Flash Player makes it to the list.