So Many Tags! So MANY Weaknesses!

You’d think being ‘limited’ to internet-exploitable vulnerabilities would reduce the set of weaknesses attackers take adavantage. And, you’d be wrong.
vulnerabilities
cybersecurity
Author

boB Rudis

Published

March 23, 2023

This is mostly a test to make sure we can easily embed Observable vis.

2023-04-18-15-52-47.png