Mar 2, 2022 Latency Analysis of DHS CISA KEVs In this blog, CSW experts analyzed CISAโs Known Exploited Vulnerabilities (KEV) list for latencies in publishing, exploiting, and patching to understand how fast attackers are weaponizing them for attacks.
Jun 4, 2021 FiveHands Ransomware Analysis: Can a Risk-Based Approach Help Prevent Future Attacks? Threat actors exploited a vulnerability, attacked an organization, and stole information.