Discover the definition of the term Weaponized presented by Les Assises de la Cybersécurité.


A vulnerability is often only potential, then it materializes in the form of a “proof of concept”, an experimental code that proves that the vulnerability is indeed exploitable. The next step is for hackers to seize it and turn it into a real attack tool that can be used in real attacks. We then say that they have weaponized the vulnerability, that is to say, they have transformed it into an operational weapon.

Now we are waiting for Britney Spears to sing “Weaponized”…

Cookies help us improve your website experience.
By using our website, you agree to our use of cookies.