
Top Twenty Most Exploited Vulnerabilities in 2021
The number of vulnerabilities in 2021 have dramatically increased so that the technical teams in charge of the patch management find themselves drowning in a myriad of critical and urgent task
The number of vulnerabilities in 2021 have dramatically increased so that the technical teams in charge of the patch management find themselves drowning in a myriad of critical and urgent task
MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) is a curated knowledge base and model forcyber adversary behavior, reflecting the various phases of an adversary’s lifecycle and the platforms they are known to target. ATT&CK is useful for understanding security risk against known adversary behavior, for planning security improvements, and ...
We delved into the tons of vulnerability intelligence data we accumulated over the years. I love to see patterns as I firmly believe that there will be always someone out there that will give these data a meaning
New Feature !Vulnerability Common Patch Format vFeed Vulnerability Intelligence Service was created to provide correlation of a wide range of information datasets and aligning them with common vulnerabilities. Thus customers will have a complete database which can be used to retrieve the metrics and indicators they want to use to ...
The number of vulnerabilities continues to increase so much that the technical teams in charge of the patch management find themselves drowning in a myriad of critical and urgent tasks. Therefore we have taken the time to review the profile of the most critical vulnerabilities & issues that impacted year ...
This paper is based on the report from Ponemon Institute “Costs and Consequences of Gaps in Vulnerability Response”. vFeed, Inc outlined the most significant outcomes and mapped them with the data features provided by our vulnerability intelligence solution. And it was astonishing to see how our datasets are completely aligned ...
There is no shortage of potential threats to your digital security. In fact, the number and diversity of attacks, vulnerabilities, and exploits are growing at an increasing pace. From operating systems to client programs to firmware for our network devices – nothing remains untouched for long. Luckily, the digital security ...
Almost for as long as computers have been around, there have been vulnerabilities and individuals willing to exploit them for their gain, and your detriment. These vulnerabilities aren’t decreasing, but actually increasing as the complexity and diversity of our technologies and software systems expand over time. In many cases, these ...
Security company ClearSky has released few days ago a very detailed report about Iranian hackers Group that have targeted large companies from the IT, Telecommunication, Oil and Gas, Aviation, Government, and Security sectors around the world in order to plant backdoors.
Every day, new common vulnerabilities and exploits are publicly exposed. While this brings these flaws to the public’s attention and allows users to patch them, it also alerts potential attackers to their existence. Once a CVE is known, you should immediately take whatever steps you can to reduce the threat ...