The Journey to 300,000 Vulnerabilities: The Good, The Bad, and The Bizarre

The Journey to 300,000 Vulnerabilities: The Good, The Bad, and The Bizarre

Our VulnDB team reached a tremendous milestone in our pursuit of best-in-class vulnerability intelligence— aggregating our 300,000th vulnerability disclosure. The post The Journey to 300,000 Vulnerabilities: The Good, The Bad, and The Bizarre appeared first on Flashpoint ... Read More
Marconi’s Wireless Telegraph and the First Vulnerability

Marconi’s Wireless Telegraph and the First Vulnerability

What is the first vulnerability? On first thought, it doesn’t seem like pinpointing the first correctly defined vulnerability would be difficult. After all, isn’t the computer security industry relatively young? If only software comes to mind when thinking of vulnerabilities, then yes, the computer security industry is considerably brief compared ... Read More
The Types of Zero-Day Vulnerabilities and How to Defend Against Them

The Types of Zero-Day Vulnerabilities and How to Defend Against Them

For many years, the term “zero-day” has been overused by news outlets and some security providers—mythologizing it to become the ‘big bad wolf’ of the security world that renders any organization’s systems useless with one click of a mouse. While that may be technically true, there is a lot more ... Read More
The Types of Zero-Day Vulnerabilities and How to Defend Against Them

The Types of Zero-Day Vulnerabilities and How to Defend Against Them

For many years, the term “zero-day” has been overused by news outlets and some security providers—mythologizing it to become the ‘big bad wolf’ of the security world that renders any organization’s systems useless with one click of a mouse. While that may be technically true, there is a lot more ... Read More