Documenting Vulnerabilities Abused By Ransomware Gangs | Avast

Documenting Vulnerabilities Abused By Ransomware Gangs | Avast

A group of security researchers have put together a comprehensive schema to track common vulnerabilities of popular products. It’s an especially interesting resource because it visually documents how ransomware gangs are using weak points to leverage their way into popular networks and endpoints. The effort was first begun by Allan Liska, author of several tech guides, including one on ransomware defense.

Source:: Avast