<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Hackers use PoC exploits in attacks 22 minutes after release in Threats</title>
    <link>https://community.isc2.org/t5/Threats/Hackers-use-PoC-exploits-in-attacks-22-minutes-after-release/m-p/72650#M1297</link>
    <description>&lt;P&gt;Thanks for sharing&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 31 Jul 2024 06:23:56 GMT</pubDate>
    <dc:creator>Kyaw_Myo_Oo</dc:creator>
    <dc:date>2024-07-31T06:23:56Z</dc:date>
    <item>
      <title>Hackers use PoC exploits in attacks 22 minutes after release</title>
      <link>https://community.isc2.org/t5/Threats/Hackers-use-PoC-exploits-in-attacks-22-minutes-after-release/m-p/72558#M1282</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Threat actors are quick to weaponize available proof-of-concept (PoC) exploits in actual attacks, sometimes as quickly as 22 minutes after exploits are made publicly available.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That is according to Cloudflare's Application Security report for 2024, which covers activity between May 2023 and March 2024 and highlights emerging threat trends.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cloudflare, which currently processes an average of 57 million HTTP requests per second, continues to see heightened scanning activity for disclosed CVEs, followed by command injections and attempts to weaponize available PoCs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.bleepingcomputer.com/news/security/hackers-use-poc-exploits-in-attacks-22-minutes-after-release/" target="_blank"&gt;https://www.bleepingcomputer.com/news/security/hackers-use-poc-exploits-in-attacks-22-minutes-after-release/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2024 05:18:02 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Hackers-use-PoC-exploits-in-attacks-22-minutes-after-release/m-p/72558#M1282</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-07-29T05:18:02Z</dc:date>
    </item>
    <item>
      <title>Re: Hackers use PoC exploits in attacks 22 minutes after release</title>
      <link>https://community.isc2.org/t5/Threats/Hackers-use-PoC-exploits-in-attacks-22-minutes-after-release/m-p/72650#M1297</link>
      <description>&lt;P&gt;Thanks for sharing&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2024 06:23:56 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Hackers-use-PoC-exploits-in-attacks-22-minutes-after-release/m-p/72650#M1297</guid>
      <dc:creator>Kyaw_Myo_Oo</dc:creator>
      <dc:date>2024-07-31T06:23:56Z</dc:date>
    </item>
  </channel>
</rss>

