Port 22

Adobe, Apple, Cisco, Microsoft Flaws Make Up Half of KEV Catalog

CISAs Known Exploited Vulnerabilities Catalog has become a valuable repository of vulnerabilities to be patched. A pair of reports analyze the vulnerabilities under attack to understand the kind of threats organizations should be prioritizing.