Top Twenty Most Exploited Vulnerabilities in 2021
ToolsWatch
by NJ Ouchn
1y ago
The number of vulnerabilities in 2021 have dramatically increased so that the technical teams in charge of the patch management find themselves drowning in a myriad of critical and urgent task Compared to 2020, which was dominated by a high prevalence of Microsoft Windows, this year, it is the Apache Server who is leading the [&hellip ..read more
Visit website
Top 10 Most Used MITRE ATT&CK Tactics & Techniques In 2020
ToolsWatch
by NJ Ouchn
1y ago
MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) is a curated knowledge base and model forcyber adversary behavior, reflecting the various phases of an adversary’s lifecycle and the platforms they are known to target. ATT&CK is useful for understanding security risk against known adversary behavior, for planning security improvements, and verifying defenses work as expected. [&hellip ..read more
Visit website
Top 10 Most Exploited Vulnerabilities in 2020
ToolsWatch
by NJ Ouchn
1y ago
We delved into the tons of vulnerability intelligence data we accumulated over the years. I love to see patterns as I firmly believe that there will be always someone out there that will give these data a meaning Here is the list of Top Ten Severe Security Vulnerabilities for year 2020. We have relied on [&hellip ..read more
Visit website
VFeed, Inc. Introduces Vulnerability Common Patch Format Feature
ToolsWatch
by NJ Ouchn
1y ago
New Feature !Vulnerability Common Patch Format vFeed Vulnerability Intelligence Service was created to provide correlation of a wide range of information datasets and aligning them with common vulnerabilities. Thus customers will have a complete database which can be used to retrieve the metrics and indicators they want to use to enrich their solution. However, due [&hellip ..read more
Visit website
Efficiency of the Vulnerability Response With vFeed Intelligence
ToolsWatch
by NJ Ouchn
1y ago
This paper is based on the report from Ponemon Institute “Costs and Consequences of Gaps in Vulnerability Response”. vFeed, Inc outlined the most significant outcomes and mapped them with the data features provided by our vulnerability intelligence solution. And it was astonishing to see how our datasets are completely aligned with the conclusion and with [&hellip ..read more
Visit website
CVE In The Hook – Monthly Vulnerability Review (March 2020 Issue)
ToolsWatch
by NJ Ouchn
1y ago
There is no shortage of potential threats to your digital security. In fact, the number and diversity of attacks, vulnerabilities, and exploits are growing at an increasing pace. From operating systems to client programs to firmware for our network devices – nothing remains untouched for long. Luckily, the digital security field consists of an active [&hellip ..read more
Visit website
CVE In The Hook – Monthly Vulnerability Review (February 2020 Issue)
ToolsWatch
by NJ Ouchn
1y ago
Almost for as long as computers have been around, there have been vulnerabilities and individuals willing to exploit them for their gain, and your detriment. These vulnerabilities aren’t decreasing, but actually increasing as the complexity and diversity of our technologies and software systems expand over time. In many cases, these vulnerabilities are picked up by [&hellip ..read more
Visit website
Fox Kitten -Iranian Espionage – leveraged 4 CVEs Pulse Secure, Fortinet, Palo Alto Networks, and Citrix VPNs
ToolsWatch
by NJ Ouchn
1y ago
Security company ClearSky has released few days ago a very detailed report about Iranian hackers Group that have targeted large companies from the IT, Telecommunication, Oil and Gas, Aviation, Government, and Security sectors around the world in order to plant backdoors. In this post, we will show you how our vFeed indicators could have been [&hellip ..read more
Visit website
CVE In The Hook – Monthly Vulnerability Review (January 2020 Issue)
ToolsWatch
by NJ Ouchn
1y ago
Every day, new common vulnerabilities and exploits are publicly exposed. While this brings these flaws to the public’s attention and allows users to patch them, it also alerts potential attackers to their existence. Once a CVE is known, you should immediately take whatever steps you can to reduce the threat to you. In most cases, [&hellip ..read more
Visit website
Top 5 Critical CVEs Vulnerability from 2019 That Every CISO Must Patch Before He Gets Fired !
ToolsWatch
by NJ Ouchn
1y ago
The number of vulnerabilities continues to increase so much that the technical teams in charge of the patch management find themselves drowning in a myriad of critical and urgent tasks. Therefore we have taken the time to review the profile of the most critical vulnerabilities & issues that impacted year 2019. After this frenzy during [&hellip ..read more
Visit website

Follow ToolsWatch on Feedspot

Continue with Google
OR