Ransomware criminals love CISA’s KEV list – and that’s a bug, not a feature

1 in 3 entries are used to extort civilians, says new paper

Fresh research suggests attackers are actively monitoring databases of vulnerabilities that are known to be useful in carrying out ransomware attacks.…

This article has been indexed from The Register – Security

Read the original article: