Minimize your digital risk by detecting data loss, securing your online brand, and reducing your attack surface.
A powerful, easy-to-use search engine that combines structured technical data with content from the open, deep, and dark web.
Digital Risk Protection
Read our new practical guide to reducing digital risk.
New report recognizes Digital Shadows for strongest current offering, strategy, and market presence of 14 vendors profiled
Read Full Report
Not all vulnerabilities are created equal, and those that have been exploited by threat actors carry more weight. Last month, Digital Shadows reported on ten software vulnerabilities that were publicly exploited by threat actors. The motives for these attacks included information theft, espionage, financial profit, and disruption. The three key takeaways were:
The table below provides an overview of the vulnerabilities, including an indication of how widely they were discussed across social media and other sources of potential insight into their popularity. Specifically, it shows:
Table 1: Summary of vulnerabilities reported as exploited in April 2018
It’s a constant challenge to understand which patches you ought to prioritize applying, but this blog provides information that can help to feed into your decision. If you are running the applications, systems and services listed, these are the 10 vulnerabilities you should be paying attention to. The next post in this series will provide a similar analysis of vulnerabilities for May 2018.
To stay up-to-date with the latest vulnerabilities and threat intelligence, subscribe to our newsletter.