{"id":2179,"date":"2015-11-10T05:48:24","date_gmt":"2015-11-09T21:48:24","guid":{"rendered":"http:\/\/staging.bankvaultonline.com\/?p=2179"},"modified":"2015-11-10T05:48:24","modified_gmt":"2015-11-09T21:48:24","slug":"top-10-vulnerabilities-used-by-hacking-exploit-kits","status":"publish","type":"post","link":"https:\/\/www.bankvault.com\/top-10-vulnerabilities-used-by-hacking-exploit-kits\/","title":{"rendered":"The Top 10 Weakness Spots Used by Hacking Exploit Kits"},"content":{"rendered":"

Too Many websites and apps are vulnerable to be exploited by cyber criminals. According to a recent threat intelligence analysis conducted by Recorded Future comprising of over 100 exploits kits, an incredible discovery was made.<\/h2>\n

While many people are aware that Adobe Flash Player should be labeled as the most exploited product, the magnitude of exploitation targeting it was nothing short of surprising for many. This is not to say that Adobe Flash does not do enough to prevent criminals taking advantage of its software.<\/p>\n

Out of the 10 top vulnerabilities used by exploit kits out there, Adobe Flash Player managed to have 8 of them targeted. This is according to an analysis which was conducted between January 1st 2015 all the way to September 30th same year. The other two vulnerabilities leveraged exploit kits targeted Microsoft products Silverlight (CVE-2015-1671) and Internet Explorer 10 and 11 versions (CVE-2015-2419).<\/p>\n

Summary:<\/p>\n