New legal framework for reporting IT vulnerabilities
CCB
Article
Published: 15/02/2023
Cybercriminals actively seek out vulnerabilities and then use them to penetrate systems or networks. They may do so to steal data, to sabotage, to launch a ransomware attack or even for espionage purposes. But there are also people with good intentions