The CyberRisk Summit is back: Join us on Dec 6. as we recap the cyber risk landscape in 2022 | Get free ticket >> 

Live webinar, Oct 13: Attend to learn how you can deduplicate vulnerability and deliver a smarter approach to cyber risk management  | Register  >>

New report: Mapping MITRE ATT&CK framework to CVEs |  Read more  >>

The MITRE ATT&CK framework and more – introducing Voyager18

Spend any time in cyber security, and you’ll know how deep the vulnerability rabbit hole goes. Log4j. Spring4shell. Follina. The list goes on and on and on. Security researchers and bug bounty hunters trawl the sprawling wild west of application, network, and cloud environments, in search of the critical openings that might let an attacker… Continue reading The MITRE ATT&CK framework and more – introducing Voyager18

How to fix CVE-2022-0847

On Monday, a cybersecurity researcher released the details of a Linux vulnerability – CVE-2022-0847 – that allows an attacker to overwrite data in arbitrary read-only files. Dubbed Dirty Pipe by the researcher due to its similarity to the Dirty Cow flaw, – this vulnerability has already been patched in the Linux and Android kernels. Meanwhile… Continue reading How to fix CVE-2022-0847