Office is the most exploited technology, followed by Apache Struts.
Article Link: https://www.zdnet.com/article/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities/#ftag=RSSbaffb68
Office is the most exploited technology, followed by Apache Struts.
Article Link: https://www.zdnet.com/article/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities/#ftag=RSSbaffb68