Chaining Exploits are Taking Vulnerabilities to a New Level

Cyberattacks are leaping ahead in sophistication and the industry is not prepared.

As an example, Google Project Zero team recently detected attackers that exploited a combination of seven previously unknown vulnerabilities (0-days) to hack fully patched Windows, Android, and IOS systems.  

In this week’s video I cover the rapid advances of attackers, the strategic implications, and some areas in which the industry must adapt.

The cybersecurity industry must actively keep pace with the advancing capability of attackers.


Interested in more cybersecurity insights, rants, and strategic viewpoints? 

Follow me on:


How do you rate this article?



Matthew Rosenquist
Matthew Rosenquist

Cybersecurity Strategist specializing in the evolution of threats, opportunities, and risks in pursuit of optimal security for our digital world.

Cybersecurity Tomorrow
Cybersecurity Tomorrow

Cybersecurity strategy perspectives for the emerging risks and opportunities of securing our digital world. The insights of today will lead to tomorrow's security, privacy, and safety foundations.

Send a $0.01 microtip in crypto to the author, and earn yourself as you read!

20% to author / 80% to me.
We pay the tips from our rewards pool.