{"id":99411,"date":"2019-12-06T22:02:33","date_gmt":"2019-12-07T06:02:33","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2019\/12\/unpatched-systems-are-still-one-of-the-significant-attack-vectors-to-launch-cyberattacks"},"modified":"2019-12-06T22:02:33","modified_gmt":"2019-12-07T06:02:33","slug":"unpatched-systems-are-still-one-of-the-significant-attack-vectors-to-launch-cyberattacks","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2019\/12\/unpatched-systems-are-still-one-of-the-significant-attack-vectors-to-launch-cyberattacks","title":{"rendered":"Unpatched systems are still one of the significant attack vectors to launch cyberattacks"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/unpatched-systems-are-still-one-of-the-significant-attack-vectors-to-launch-cyberattacks.jpg\"><\/a><\/p>\n<p>Leaving a vulnerable system unpatched can invite troubles for an organization. The issue can turn worse when the organization suffers a cyberattack that can result in, but not limited to, compromise of confidential data, DDoS attacks or stealing of customers\u2019 details.<\/p>\n<p>According to a report released by Recorded Future, it has been found that the same vulnerabilities kept showing up year-after-year. An interesting aspect of the report was that most of these vulnerabilities were found to be exploited via phishing attacks and exploit kits that specifically target flaws in Microsoft products.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Leaving a vulnerable system unpatched can invite troubles for an organization. The issue can turn worse when the organization suffers a cyberattack that can result in, but not limited to, compromise of confidential data, DDoS attacks or stealing of customers\u2019 details. According to a report released by Recorded Future, it has been found that the [\u2026]<\/p>\n","protected":false},"author":513,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,20],"tags":[],"class_list":["post-99411","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-futurism"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/99411","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/513"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=99411"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/99411\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=99411"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=99411"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=99411"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}