The myth of the long-tail vulnerability

A long tail distribution of exploit attempts sounds reasonable. But is this how exploitation attempts really play out? Do attackers abandon exploits after a certain stage?

This article has been indexed from Cisco Blogs

Read the original article: