{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreidmigeb3ihf75zrbyo3gxtkrbevy2u65mid7bp4n3thpqpxvfg7iy",
    "uri": "at://did:plc:iir655mcoipvnewhnkv6fb3u/app.bsky.feed.post/3melwbwkfwgv2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreif63v7lgb2q2xpl62e4wtpev25xwoadvwgngmjgkqn7lltucdedte"
    },
    "mimeType": "image/png",
    "size": 741810
  },
  "path": "/blog/n-day-vulnerability-trends-turn-key-exploitation/",
  "publishedAt": "2026-02-11T15:48:27.000Z",
  "site": "https://flashpoint.io",
  "tags": [
    "link"
  ],
  "textContent": "\nIn this post we examine why N-day vulnerabilities have become the \"turn-key\" weapon of choice for modern threat actors.",
  "title": "N-Day Vulnerability Trends: The Shrinking Window of Exposure and the Rise of “Turn-Key” Exploitation"
}