Protect against Log4J without patching
Learn More
 
Protect against Log4J without patching
Learn More

news-highlightsSecurity Expert Re: U.S. Gov’t Releases Top 10 List Of Exploited Security Vulnerabilities | K2 Cyber Security

Security Expert Re: U.S. Gov’t Releases Top 10 List Of Exploited Security Vulnerabilities

News Highlights

May 12, 2020

Security Expert Re: U.S. Gov’t Releases Top 10 List Of Exploited Security Vulnerabilities



The US government today released a list of the top 10 security vulnerabilities routinely exploited by foreign cyber actors between 2016 and 2019. Cybersecurity and Infrastructure Security Agency (CISA) and the FBI issued the CVEs alert through the National Cyber Awareness System of the DHS to advise security professionals to prioritize patching these vulnerabilities to help reduce the risk of foreign threats.

Read comments from K2’s VP of Marketing here

K2 CYBER SECURITY

K2 Cyber Security delivers the Next Generation Application Security Platform to secure web applications and container workloads against sophisticated attacks in OWASP Top 10 and provides exploitable vulnerability detection during pre-production. K2’s Platform is deployed on production servers for runtime protection of applications and on pen-testing/pre-production/QA servers for interactive application security testing to identify the location of the vulnerable code. K2’s solution generates almost no false positives, eliminates breaches due to zero-day attacks, detects attacks missed by traditional security tools like Web Application Firewalls and host based EDR, finds missed exploitable vulnerabilities and dramatically reduces security cost. K2 Cyber Security is headquartered in the USA and provides cyber security solutions globally.

CONTACT INFO

K2 Cyber Security, Inc.

2580 N. First Street, #130

San Jose, CA 95131