Tales from the Underground: The Vulnerability Weaponization Lifecycle

Posted on in Presentations

There is little, if any, research that follows CVEs from zero-day status until “end of life,” which can mislead cybersecurity practitioners to believe old exploits to be harmless. New research following the lifecycle of a CVE, using recent examples from the underground, will prove that putting off patching can leave organizations susceptible to exploitation for years to come.

Mayra Rosario Fuentes


Senior Threat Researcher, Trend Micro

Share With Your Community