During the past year, we’ve seen numerous incidents where highly-respected, and widely-utilized software solutions have been exploited to launch highly-effective cyberattacks against their users. In many instances these solutions had vulnerabilities that malicious actors could exploit to compromise the networks…