Get a demo

CVE-2019-14287 is Out, But a Workaround’s Available

The team responsible for sudo, a popular Linux command-line tool, published a new security alert under CVE-2019-14287. It has a high CVSS score of 8.8, and Vulcan Cyber’s threat intel has found it to be exploitable. This would result in it posing a high-to-critical risk in most environments. 

New Exploit for Four Year Old Vulnerability MS15-014 Poses an Imminent Threat

New exploit published for a Group Policy vulnerability disclosed back in 2015, allows remote code execution on vulnerable version of Windows. While the original CVSS score for the vulnerability was just 3.3, the new exploit may in fact require immediate attention. 

Secure DevOps Mindset Through Continuous Development and VM

With the advent of the cloud computing movement, organizations have been shifting to managed infrastructures to offset IT costs. Yet in a complex and ever changing multi-OS environment, patching is not always so easy. Different operating systems and cloud environments as well as the potential of spanned on-premise and cloud environments further complicate the patching… Continue reading Secure DevOps Mindset Through Continuous Development and VM

Vulcan Cyber Named a Gartner 2019 Cool Vendor in Security and Risk Management

TEL AVIV, Oct. 24, 2019 — Israeli startup Vulcan Cyber, helping enterprises close the cybersecurity vulnerability remediation gap, has been named a Cool Vendor in the latest Gartner, Inc. Cool Vendors in Security and Risk Management, 2H19* report (Gartner subscription required). Gartner’s report recognizes interesting, new and innovative Security and Risk Management vendors. 

Don’t React to the Headlines – Solutions for Cyber Security

Malicious breaches are on the rise and they’re getting more expensive, according to a July 2019 IBM report. An average breach now costs $3.92 million, with larger breaches costing over $100 million before penalties. Vulnerabilities are increasing with roughly 1,000 new ones reported per month. Meanwhile, there’s a shortage of cybersecurity workers; in the US… Continue reading Don’t React to the Headlines – Solutions for Cyber Security

Vulnerability Scanning as the First Step to Risk Remediation

With all the vulnerability remediation suites and individual tools on the market, it can be hard to determine which features and components are essential, which features are merely “nice to have”, and which are a waste of resources. We’ve sorted through the myriad of products and came up with the following list of eight components… Continue reading Vulnerability Scanning as the First Step to Risk Remediation

The Best Data Breach Response from CEOs

The massive “Collection #1” breach of 2019 exposed 772,904,991 unique emails and 21,222,975 unique passwords. The data appears to have been taken from a number of sources, meaning a number of CEOs faced the same question that Mark Zuckerburg, John Legere (Tmobile), Paul Black (Allscripts), Steve Long (Hancock Health), Matt Raoul (Timehop) and others have… Continue reading The Best Data Breach Response from CEOs

Vulcan Cyber Raises Additional $10M to Combat Breaches from Known and Emerging Vulnerabilities by Automating and Streamlining Remediation Process

Highlights: Brings total raised in one year to $14 million for expansion of North American operations and R&D Mark Hatfield, general partner at Ten Eleven Ventures joins Vulcan board Glenn Chisholm, former CTO of Cylance joins as investor Vulcan Cyber today announced raising $10 million in Series A funding, enabling the company to continue its… Continue reading Vulcan Cyber Raises Additional $10M to Combat Breaches from Known and Emerging Vulnerabilities by Automating and Streamlining Remediation Process

Network Attack Types Employed by Superstar Hackers

You might think that the hackers bringing down organizations and infrastructures are government trained, highly advanced coders. The truth is far less dramatic- but of far greater concern to security professionals. Many powerful exploits have found their way into the hands of amateurs, who would never have been able to create them themselves. It’s the… Continue reading Network Attack Types Employed by Superstar Hackers

Prioritizing Risk with Vulcan Remediation Orchestration

By this point, we’re all well aware of the torrents of vulnerabilities out there and the pressure that they impose on CISOs and security teams. That’s why incorporating automation methodologies into the vulnerability remediation processes has become key to handling the current threat landscape safely and consistently. And not just for efficiency’s sake. As Larry… Continue reading Prioritizing Risk with Vulcan Remediation Orchestration

We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners.

View more
Accept
Decline