Resources Library

Exploits Explained

Written by Amanda Bigley | Jun 26, 2018 12:55:00 PM

Cyber Security Exploits Explained 

 

 

Defend Security Vulnerabilities 

It’s common to find exploits used as part of cyber attacks: upwards of 90%
of reported data breaches find that an exploit is used at one or more points
in the attack chain. Including exploit prevention as part of a comprehensive
lineup of security defenses is clearly valuable.

Topics in Discussion: 

  • How exploits work
  • Methods for mitigation
  • More