. home.aspx



Key Trends From the Most Exploited Vulnerabilities

March 20, 2019 / Sean Michael Kerner

While the cyber-security threat landscape is generally thought to change from year to year, some things, as it turns out, remain unchanged. According to a report released March 19 from Recorded Future that analyzes the top vulnerabilities of the past year, one of the key trends is that the same vulnerabilities keep showing up. The report also found that most vulnerabilities are being exploited via phishing attacks and exploit kits that specifically target flaws in Microsoft products. In this eWEEK Data Points article, we look at some of the key findings and insights from the Record Future vulnerabilities report. Data Point No. 1: Microsoft vulnerabilities remain actively exploited for years. Recorded Future found that a 3-year-old flaw in Microsoft's Internet Explorer was still being actively exploited.