How Lucrative are Vulnerabilities? A Closer Look at the Economics of the Exploit Supply Chain
By Tenable
Added
this report t explores the vulnerability-to-exploit (V2E) cybercrime and cybersecurity supply chain, outlines the players in the different market segments and provides insights into the related economic drivers.
Tags
Vulnerability Cybercrime market 3rd party services Pen testing Bug bounty Extortion Confidentiality Criminal group Security incident State actorTopic Map
