Introducing a new schema to track ransomware vulnerabilities


The schema includes dozens of vulnerability listings for products including Microsoft Office, SharePoint, and SonicWall

A group of security researchers have put together a comprehensive schema to track common vulnerabilities of popular products. It’s an especially interesting resource because it visually documents how ransomware gangs are using weak points to leverage their way into popular networks and endpoints. The effort was first begun by Allan Liska, author of several tech guides, including one on ransomware defense.

Read more…