Article 5MQM0 Feds list the top 30 most exploited vulnerabilities. Many are years old

Feds list the top 30 most exploited vulnerabilities. Many are years old

by
Dan Goodin
from Ars Technica - All content on (#5MQM0)
computer-security-800x534.jpg

Enlarge (credit: Getty Images)

Government officials in the US, UK, and Australia are urging public- and private-sector organizations to secure their networks by ensuring firewalls, VPNs, and other network-perimeter devices are patched against the most widespread exploits.

In a joint advisory published Wednesday, the US FBI and CISA (Cybersecurity and Infrastructure Security Agency), the Australian Cyber Security Center, and the UK's National Cyber Security Center listed the top 30 or so most exploited vulnerabilities. The vulnerabilities reside in a host of devices or software marketed by the likes of Citrix, Pulse Secure, Microsoft, and Fortinet.

Cyber actors continue to exploit publicly known-and often dated-software vulnerabilities against broad target sets, including public and private sector organizations worldwide," the advisory stated. However, entities worldwide can mitigate the vulnerabilities listed in this report by applying the available patches to their systems and implementing a centralized patch management system."

Read 8 remaining paragraphs | Comments

index?i=dmR6idodxsA:WA6cX_VhHcs:V_sGLiPB index?i=dmR6idodxsA:WA6cX_VhHcs:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments