
đź”´ August 11's Top Cyber News NOW! - Ep 428
Daily Cyber Threat Brief
00:00
The Known Exploited Vulnerabilities Catalog
Microsoft reveals remote exploitation is possible without user interaction or privileges. The SISA organization, the US cyber security and infrastructure security agency has really gone leaps and bounds to be more useful to the public sector. So if you see something that affects your organization on the known exploited list, you definitely should prioritize this.
Play episode from 11:03
Transcript


