Vulnerability Management
Attackers vs. Hackers – Two *Very* Different Animals
The cybersecurity industry is more well-informed than most, but even so, misconceptions arise and spread, helped along by the fact that the rise in cybersecurity incidents has led to substantial “pop culture” ...
VERT Threat Alert: November 2020 Patch Tuesday Analysis
Today’s VERT Alert addresses Microsoft’s November 2020 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-915 on Wednesday, November 11th. Note: Microsoft has changed their ...
N-Day Vulnerabilities: How They Threaten Your ICS Systems’ Security
In the last quarter of 2019, researchers at ClearSky uncovered an attack operation that they dubbed the “Fox Kitten Campaign.” Iranian actors used this offensive to gain persistent access into the networks ...
Vulnerability Management – The Keystone of Cybersecurity Infrastructure by Frost & Sullivan
White Paper Vulnerability Management: The Keystone of Cybersecurity Infrastructure by Frost & Sullivan In the dynamic threat landscape, organizations are faced with preventing attack and damage to their business and customers. Vulnerability ...
25 CVEs That NSA Want You to Patch Right Now
Tuesday, October 20th, wasn’t your usual Patch Tuesday announcement from Microsoft. Instead, this announcement came from the NSA urging users to patch 25 vulnerabilities Chinese hackers were exploiting, quickly. The list of ...
25 CVEs That NSA Wants You to Patch Right Now
Tuesday, October 20th, wasn’t your usual Patch Tuesday announcement from Microsoft. Instead, this announcement came from the NSA urging users to patch 25 vulnerabilities Chinese hackers were exploiting, quickly. The list of ...
The Big Lie in Threat Hunting
Wikipedia defines cyber threat hunting as “the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions.” In practice, this is a very ...
The Big Lie in Threat Hunting
Wikipedia defines cyber threat hunting as “the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions.” In practice, this is a very ...
Crane lifting Scala onto Code Property Graph to conduct vulnerability analysis
Image Courtesy : https://www.huismanequipment.com/The Scala language has continued to gain popularity over the last several years, thanks to its excellent combination of functional and object-oriented software development principles, and its implementation on top ...
VERT Threat Alert: October 2020 Patch Tuesday Analysis
Today’s VERT Alert addresses Microsoft’s October 2020 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-909 on Wednesday, October 14th. In-The-Wild & Disclosed CVEs CVE-2020-16938 ...

