Keeping track of the software and hardware you use, that then are discovered to have security flaws in them is important, especially if those flaws are being exploited by threat actors. The quicker you or the people responsible for your cyber security know there are issues, the quicker any available …
The US Cybersecurity and Infrastructure Security Agency adds 36 known exploits to it’s data base
CISA Adds 36 Known Exploited Vulnerabilities to Catalog | CISA Updates to the Known Exploited Vulnerabilities Catalog include: Owl Labs QNAP Google Cisco Adobe Netgear Microsoft