In 2019, there were more than 12,000 vulnerabilities reported and classified through CVE — and more than 1,000 of them were deemed “critical.”

With limited context (and even less time), many security teams struggle to prioritize remediation decisions around vulnerabilities. To help, Recorded Future’s researchers have scoured thousands of code repositories, underground forum postings, and dark web sites to discover which vulnerabilities are being actively exploited by cybercriminals.

Similar to 2018, Recorded Future observed more exploits targeting Microsoft products than Adobe products. Many of the top vulnerabilities of 2019 also appeared on our 2018 list — underscoring the importance of patching Microsoft products in your technology stack.

Download this report to:

  • See the year-over-year changes in exploit kit, phishing, and remote access trojan co-occurrences with vulnerabilities
  • Find out how CVSS scores correlate to actual “in the wild” severity analysis
  • Get recommendations for protecting your organization against the highest-trending vulnerabilities
Tell Your Network

You can unsubscribe from our communications at any time. For more information on how to unsubscribe, our privacy practices, and how we are committed to protecting and respecting your privacy, please review our Privacy Policy.