Posts Tagged With

vulns

Vulnerability Management
The Journey to 300,000 Vulnerabilities: The Good, The Bad, and The Bizarre
Our VulnDB team reached a tremendous milestone in our pursuit of best-in-class vulnerability intelligence— ...
Read post
Vulnerability Management
Hackers Are Still Exploiting Log4Shell Vulnerability, Warns CISA
Yesterday, CISA and US Coast Guard Cyber Command (CGCYBER) warned that nation-state hackers are still exploiting ...
Read post
Vulnerability Management
Patch Tuesday Isn’t Ending. Here’s What Microsoft is Saying
According to Microsoft, Patch Tuesday will continue in July 2022 and the foreseeable future. Unfortunately, ...
Read post
Vulnerability Management
China is Exploiting Network Providers and Devices, Says US Cybersecurity Advisory
On June 7, the US Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), ...
Read post
Vulnerability Management
The Practitioner’s Guide to Vulnerability Intelligence
Learn how vulnerability intelligence can help you manage risks and protect your organization from cyber threats.
Read post
Vulnerability Management
CISA’s Joint Cybersecurity Advisory: Protecting Your Organization From Vulnerabilities – and 29,000 Other Known Exploits
Some of the world’s leading cybersecurity authorities banded together to co-author the Joint Cybersecurity ...
Read post
Vulnerability Management
1,701 New Vulnerabilities: Vulnerability Intelligence Infographic, March 2022: Key Trends and Analysis
According to Risk Based Security, a Flashpoint company, 1,701 new vulnerabilities were disclosed last month, with ...
Read post
Vulnerability Management
SolarWinds: Sitting on Undisclosed Vulnerabilities
SolarWinds was in the news last year, as the victim of an attack that compromised its Orion Platform software by ...
Read post
Cyber Threat Intelligence
Apache Tomcat Vulnerability “Ghostcat” Attracting Threat Actor Attention
Flashpoint analysts observed that a vulnerability identified as CVE-2020-1938 has been attracting threat actor ...
Read post
Vulnerability Management
The Vulnerability Fujiwhara Effect: Microsoft and Oracle Collide
When two hurricanes collide, the phenomenon is called the Fujiwhara effect. The vulnerability intelligence world ...
Read post
Cyber Threat Intelligence
The Steady Rise of Bounty Programs, and the Counterpart
Companies that once said they would not pay for vulnerability information seven years ago, have been steadily ...
Read post