This post thumbnail

What is EPSS score? Read about EPSS score and how it can help organizations to improve their vulnerability management process.

2 May 2023 12:00 AM

This post thumbnail

Tools are an important part of any organisation's vulnerability management process, and it is around these tools that the next steps are prepared.

28 February 2023 12:00 AM

This post thumbnail

CVE and CVSS in cybersecurity. CVE–vulnerability identification standard. CVSS–vulnerability scoring standard. CVSSv2. CVSSv3. Explore Vulners vulnerability database for free.

10 February 2023 12:00 AM

This post thumbnail

Let's find out what zero-day exploits are, where they come from and who creates them. Why are zero-day vulnerabilities and exploits one of the most dangerous threats?

12 December 2022 12:00 AM

This post thumbnail

Penetration testing as a form of ethical hacking. Learn more about the legal ramifications for organizations that fail to comply with today’s pentest requirements. Read about the different approaches, purposes, and goals of penetration testing.

9 December 2022 12:00 AM

This post thumbnail

What are exploit kits? Read about the different types of exploits, vulnerabilities, and malware. Exploits attack vectors: zero-day, DoS, spoofing, XXS. How to avoid being victim of an exploit attack?

16 November 2022 12:00 AM

This post thumbnail

The new version of OpenSSL announced in the infosec contains fixes for two high-severity vulnerabilities.

7 November 2022 12:00 AM

This post thumbnail

A fresh vulnerability in Apache Commons Text is already being exploited. Read the article for the latest cybersecurity news.

26 October 2022 12:00 AM

This post thumbnail

Every day we hear more and more about cyberattacks. Let's figure out what is a cyberattack, what is the cause and how to prevent or avoid them.

25 October 2022 12:00 AM

This post thumbnail

The CVE is a unique identifier for each vulnerability. Let's figure out how these unique identifiers are assigned and where to find information about CVE.

5 October 2022 12:00 AM

This post thumbnail

The internal vulnerability scanner is an important part of cybersecurity for the Enterprise segment. Let's find out why it's so important and how it works

6 September 2022 12:00 AM

This post thumbnail

What is a data breach? How can a data leak happen? What are the common ways of data breach prevention? Find out the answers to this and other questions in our guide.

25 August 2022 12:00 AM