Please turn on your JavaScript for this page to function normally.

vulnerability assessment

shark
Which vulnerabilities were most exploited by cybercriminals in 2019?

Which ten software vulnerabilities should you patch as soon as possible (if you haven’t already)? Table of top exploited CVEs between 2016 and 2019 (repeats are noted by …

Fire
CVE gap widens: 16,738 vulnerabilities disclosed during the first nine months of 2019

Risk Based Security’s VulnDB team aggregated 16,738 newly-disclosed vulnerabilities during the first three quarters of 2019 which surpassed CVE/NVD by 5,970 during the same …

geometry
When is the right time to red team?

“It takes a thief to catch a thief.” Despite being hundreds of years old, this idiom holds perfectly true for that most modern of thieves, the cybercriminal. With …

burn
How mainstream media coverage affects vulnerability management

For better or for worse, mainstream media is increasingly covering particularly dangerous, widespread or otherwise notable security vulnerabilities. The growing coverage has …

magnify
Researchers working on tools that aim to eliminate computer bugs

It’s bad enough losing an hour’s work when your computer crashes – but in settings like healthcare and aviation, software glitches can have far more serious consequences. In …

fingers crossed
Should enterprises delay efforts to remediate most vulnerabilities?

Companies today appear to have the resources needed to address all of their high-risk vulnerabilities. The research demonstrates that companies are getting smarter in how they …

Hand
66.1% of vulnerabilities published through Q3 2018 have a documented solution

There have been 16,172 vulnerabilities disclosed through October 29th, which is a 7% decrease from the high record reported last year at this time. The 16,172 vulnerabilities …

measure
Vulnerabilities’ CVSS scores soon to be assigned by AI

The National Institute of Standards and Technology (NIST) is planning to use IBM’s Watson to evaluate how critical publicly reported computer vulnerabilities are and …

Car
Connected car security is improving, researchers say

The automotive industry has apparently stepped up their game when it comes to improving connected car security. According to the latest IOActive report, which was compiled …

WhiteSource unveils free open source Vulnerability Checker

WhiteSource announced the release of its Vulnerability Checker, a free tool that provides companies with immediate, real-time alerts on the 50 most critical open source …

strategy
There’s a global divide in how organizations assess cyber risk

Nearly 48 percent of organizations globally have embraced strategic vulnerability assessment – defined as mature or moderately mature programs that include targeted and …

Don't miss

Cybersecurity news