CVEs, Damned CVEs, and Statistics

Is your vulnerability scanner showing zero problems with your Linux systems? If so, it’s probably missing something important. Conversely, if it’s suddenly showing hundreds of vulnerabilities, that’s likely an overstatement too. And ...
vulnerabilities, root cause, Microsoft Storm-1152 fake accounts CaaS

The Value in Root Cause Analysis for Vulnerability Management

Identifying and addressing underlying issues and their root causes can lead to risk reduction, cost savings and better overall performance of a vulnerability management program ...
Security Boulevard
severity, Tenable, application security, vulnerabilities, software, vulnerabilities, issues, servers, vulnerability, Linux, vulnerability management, risk-based, vulnerabilities third-party supply chain Okta endpoint security

The Value in Root Cause Analysis for Vulnerability Management

Identifying and addressing underlying issues and the root cause of them can lead to risk reduction, cost savings and better overall performance of a vulnerability management program ...
Security Boulevard
severity, Tenable, application security, vulnerabilities, software, vulnerabilities, issues, servers, vulnerability, Linux, vulnerability management, risk-based, vulnerabilities third-party supply chain Okta endpoint security

Smashing Silos With a Vulnerability Operations Center (VOC)

VOC enables teams to address the vulnerabilities that present the greatest risk to their specific attack surface before they can be exploited ...
Security Boulevard
Success hitting target aim goal achievement concept background - three darts in bull's eye close up. red three darts arrows in the target center business goal concept

The NIST Finally Hires a Contractor to Manage CVEs

Security experts have been frustrated because no one was managing the Common Vulnerabilities and Exposures security reports. Good news: The NIST has hired a company to manage the backlog. Bad news: The ...
Security Boulevard

HPE Aruba Vulnerabilities: Prevent Systems From RCE Attacks

Recently, HPE Aruba Networking, formerly known as Aruba Networks, has encountered significant security challenges. Vulnerabilities in their ArubaOS, the proprietary network operating system, have been identified, posing serious risks, including remote code ...
LockBit ransomware Federal Reserve

CISA Cites Modest Progress in Reducing CVEs

CISA highlighted advancements related to two Cybersecurity Performance Goals (CPGs) it first introduced in October 2022 ...
Security Boulevard

CACTUS Qlik Ransomware: Vulnerabilities Exploited

A cyberattack campaign dubbed the CACTUS Qlik Ransomware has become prominent in ransomware attacks on BI systems. Researchers have warned of threat actors exploiting three Qlik security vulnerabilities to target different organizations ...
Microsoft Colonial Pipeline, lessons, vulnerabilities pipedream supply chains CI/CD pipeline dev environment Linux

Microsoft Vulnerabilities Top CISA’s List of Ransomware-Linked CVEs

Microsoft products, including Windows and Exchange Server, are highly targeted, accounting for most CVEs used in ransomware attacks ...
Security Boulevard
insurers, CaaS, insurance, AI-related, security, insurance, cybersecurity, cyber insurance, cybersecurity, insurance

Coalition Forecasts CVE Disclosure Spike in 2023

Coalition, a provider of cyberinsurance, today published a report that predicted a 13% increase in the average number of vulnerabilities disclosed per month in 2023. The report estimated more than 1,900 additional ...
Security Boulevard