{"id":53087,"date":"2023-08-04T14:13:55","date_gmt":"2023-08-04T14:13:55","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34868\/Five-Eyes-Agencies-Call-Attention-To-Most-Frequently-Exploited-Vulns.html"},"modified":"2023-08-04T14:13:55","modified_gmt":"2023-08-04T14:13:55","slug":"five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns\/","title":{"rendered":"Five Eyes Agencies Call Attention To Most Frequently Exploited Vulns"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.securityweek.com\/wp-content\/uploads\/2023\/01\/Cybersecurity_News-SecurityWeek.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><strong>Government agencies in Australia, Canada, New Zealand, the UK, and the US have published a list of the software vulnerabilities that were most frequently exploited in malicious attacks in 2022.<\/strong>\n<\/p>\n<p>Last year, the Five Eyes agencies say, threat actors mainly targeted internet-facing systems that were not patched against older, known vulnerabilities, including flaws for which proof-of-concept (PoC) exploit code exists publicly.\n<\/p>\n<p>\u201cMalicious cyber actors generally have the most success exploiting known vulnerabilities within the first two years of public disclosure\u2014the value of such vulnerabilities gradually decreases as software is patched or upgraded. Timely patching reduces the effectiveness of known, exploitable vulnerabilities, possibly decreasing the pace of malicious cyber actor operations,\u201d the agencies note.\n<\/p>\n<p>Threat actors, the agencies say, likely focus on exploits for severe vulnerabilities that have wider impact, which provides them with \u201clow-cost, high-impact tools\u201d that can be used for years, and prioritize exploits for bugs impacting the networks of their specific targets.\n<\/p>\n<p>Throughout 2022, the reporting agencies observed the<a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa23-215a\" target=\"_blank\" rel=\"noreferrer noopener\"> frequent exploitation of 12 vulnerabilities<\/a>, some of which were exploited in previous attacks as well, although patches have been available for years.\n<\/p>\n<p>The list includes CVE-2018-13379 (<a href=\"https:\/\/www.securityweek.com\/us-uk-and-australia-warn-iranian-apts-targeting-fortinet-microsoft-exchange-flaws\/\" target=\"_blank\" rel=\"noreferrer noopener\">Fortinet SSL VPNs<\/a>), CVE-2021-34473, CVE-2021-31207, CVE-2021-34523 (Microsoft Exchange, <a href=\"https:\/\/www.securityweek.com\/microsoft-issues-guidance-proxyshell-vulnerabilities\/\" target=\"_blank\" rel=\"noreferrer noopener\">ProxyShell<\/a>), CVE-2021-40539 (<a href=\"https:\/\/www.securityweek.com\/us-agencies-share-more-details-adselfservice-plus-vulnerability-exploitation\/\" target=\"_blank\" rel=\"noreferrer noopener\">Zoho ManageEngine ADSelfService Plus<\/a>), CVE-2021-26084, CVE-2022-26134 (<a href=\"https:\/\/www.securityweek.com\/cybercriminals-state-sponsored-threat-actors-exploiting-confluence-server-vulnerability\/\" target=\"_blank\" rel=\"noreferrer noopener\">Atlassian Confluence<\/a>), CVE-2021- 44228 (<a href=\"https:\/\/www.securityweek.com\/one-year-later-log4shell-remediation-slow-painful-slog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Log4Shell<\/a>), CVE-2022-22954, CVE-2022-22960 (<a href=\"https:\/\/www.securityweek.com\/exploitation-vmware-vulnerability-imminent-following-release-poc\/\" target=\"_blank\" rel=\"noreferrer noopener\">VMware products<\/a>), CVE-2022-1388 (<a href=\"https:\/\/www.securityweek.com\/critical-vulnerability-exploited-destroy-big-ip-appliances\/\" target=\"_blank\" rel=\"noreferrer noopener\">F5 BIG-IP<\/a>), and CVE-2022-30190 (Windows, <a href=\"https:\/\/www.securityweek.com\/windows-updates-patch-actively-exploited-follina-vulnerability\/\" target=\"_blank\" rel=\"noreferrer noopener\">Follina<\/a>).\n<\/p>\n<p>Additionally, the Five Eyes agencies call attention to 30 other known vulnerabilities that were routinely exploited in attacks in 2022, in products from Apache, Citrix, F5 Networks, Fortinet, Ivanti, Microsoft, Oracle, QNAP, SAP, SonicWall, VMware, WSO2, and Zimbra.<\/p>\n<div class=\"zox-post-ad-wrap\"><span class=\"zox-ad-label\">Advertisement. Scroll to continue reading.<\/span><\/div>\n<p>Vendors and developers are advised to audit their environments to identify classes of exploited vulnerabilities and eliminate them, implement secure design practices, prioritize secure-by-default configurations, and follow Secure Software Development Framework (SSDF).\n<\/p>\n<p>End-user organizations are advised to apply available software updates and patches in a timely manner, perform secure system backups, maintain a cybersecurity incident response plan, implement robust identity and access management policies, ensure that internet-facing network devices are secured, implement Zero Trust Network Architecture (ZTNA), and improve their supply-chain security.\n<\/p>\n<p><strong>Related:<\/strong><a href=\"https:\/\/www.securityweek.com\/cisa-tells-us-agencies-to-patch-exploited-roundcube-vmware-flaws\/\"> CISA Tells US Agencies to Patch Exploited Roundcube, VMware Flaws<\/a>\n<\/p>\n<p><strong>Related:<\/strong><a href=\"https:\/\/www.securityweek.com\/cisa-several-old-linux-vulnerabilities-exploited-in-attacks\/\"> CISA: Several Old Linux Vulnerabilities Exploited in Attacks<\/a>\n<\/p>\n<p><strong>Related:<\/strong><a href=\"https:\/\/www.securityweek.com\/670-ics-vulnerabilities-disclosed-by-cisa-in-first-half-of-2023-analysis\/\"> 670 ICS Vulnerabilities Disclosed by CISA in First Half of 2023: Analysis<\/a>\n<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34868\/Five-Eyes-Agencies-Call-Attention-To-Most-Frequently-Exploited-Vulns.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":53088,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[10196],"class_list":["post-53087","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinegovernmentflaw"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Five Eyes Agencies Call Attention To Most Frequently Exploited Vulns 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Five Eyes Agencies Call Attention To Most Frequently Exploited Vulns 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-04T14:13:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.securityweek.com\/wp-content\/uploads\/2023\/01\/Cybersecurity_News-SecurityWeek.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Five Eyes Agencies Call Attention To Most Frequently Exploited Vulns\",\"datePublished\":\"2023-08-04T14:13:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns\\\/\"},\"wordCount\":396,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns.jpg\",\"keywords\":[\"headline,government,flaw\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns\\\/\",\"name\":\"Five Eyes Agencies Call Attention To Most Frequently Exploited Vulns 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns.jpg\",\"datePublished\":\"2023-08-04T14:13:55+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,flaw\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentflaw\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Five Eyes Agencies Call Attention To Most Frequently Exploited Vulns\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Five Eyes Agencies Call Attention To Most Frequently Exploited Vulns 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns\/","og_locale":"en_US","og_type":"article","og_title":"Five Eyes Agencies Call Attention To Most Frequently Exploited Vulns 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-08-04T14:13:55+00:00","og_image":[{"url":"https:\/\/www.securityweek.com\/wp-content\/uploads\/2023\/01\/Cybersecurity_News-SecurityWeek.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Five Eyes Agencies Call Attention To Most Frequently Exploited Vulns","datePublished":"2023-08-04T14:13:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns\/"},"wordCount":396,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns.jpg","keywords":["headline,government,flaw"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns\/","url":"https:\/\/www.threatshub.org\/blog\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns\/","name":"Five Eyes Agencies Call Attention To Most Frequently Exploited Vulns 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns.jpg","datePublished":"2023-08-04T14:13:55+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/five-eyes-agencies-call-attention-to-most-frequently-exploited-vulns\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,flaw","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentflaw\/"},{"@type":"ListItem","position":3,"name":"Five Eyes Agencies Call Attention To Most Frequently Exploited Vulns"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53087","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=53087"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53087\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/53088"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=53087"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=53087"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=53087"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}