A recent RAND report, released just two days after Wikileaks opened its Vault 7 that detailed the CIA’s entire stockpile of vulnerabilities and their suite of cyber tools (also referred as exploits), seeks to establish a protocol and the advantages of state intelligence agencies maintaining classified vulnerability stockpiles.
The Paradox of Technological Vulnerabilities: Anyone Can Use Them
The paradox of technological vulnerabilities: anyone can use them