Between January and March, threat actors started scanning for vulnerable systems roughly 15 minutes after new security holes were publicly disclosed, and they were three times faster when Microsoft disclosed four new bugs in Exchange Server on March 2. For comparison, global enterprises need roughly 12 hours to identify vulnerable systems within their environments, provided […]
Latest Comments