Skip to content

#RSAC: Log4J Still Among Top Exploited Vulnerabilities, Cato Finds

  • by

A new report by Cato Networks found that exploiting old vulnerabilities in unpatched systems is one of threat actors’ favorite initial access vectors

Leave a Reply

Your email address will not be published. Required fields are marked *