Attack technique alert: Vulcan Cyber discovered that AI package hallucination open developers to malicious attacks | Learn more >>

OWASP top 10 LLM risks: Discover the OWASP top 10 LLM risks for 2023 and the steps we can take to prevent them | Read more >>

CVE-2023-32784 in KeePass: How to fix the KeePass password manager vulnerability | Read more >>

Attack technique alert: Vulcan Cyber discovered that AI package hallucination open developers to malicious attacks | Learn more >>

OWASP top 10 LLM risks: Discover the OWASP top 10 LLM risks for 2023 and the steps we can take to prevent them | Read more >>

CVE-2023-32784 in KeePass: How to fix the KeePass password manager vulnerability | Read more >>

TRY VULCAN FREE

Q1 2023 vulnerability watch

Cyber risk in 2022: A 360° view​

Explore major cyber risk developments and trends in 2022 with this report from the Vulcan Cyber Voyager18 team. It provides insights into the current landscape and offers strategies for enhancing security posture in 2023.  

A step-by-step guide to achieving cyber security maturity

Read the eBook to understand the four stages of cyber security maturity: Reactive, data-driven, orchestrated, and transformative. Learn the behaviors and benefits of each stage, and discover how your organization can move from “Reactive” to “Transformative”, to more effectively protect your business from security threats.    

Addressing security gaps with risk-based vulnerability management

Considering the enormous damage that comes with a breach of personal financial data, it’s critical for financial institutions to implement a robust cyber risk management program that takes into account the unique challenges of their environments. This white paper explores the top cyber security risks that practitioners face and how a risk-based vulnerability management approach can help close security gaps brought on… Continue reading Addressing security gaps with risk-based vulnerability management

SANS vulnerability management survey 2022

While vulnerability management processes are growing more mature, many organizations continue to struggle with the sheer volume of information. Even as vulnerability management programs improve and grow more sophisticated, IT security teams must employ more efficient measures to make the most of the vulnerability information they are receiving. This white paper – produced in partnership… Continue reading SANS vulnerability management survey 2022

Exploit maturity: an introduction

IT Security teams know that fixing all vulnerabilities is impossible. The goal is not to fix everything, but to mitigate the cyber risk with the most impact. Exploit maturity helps us make sense of the most pressing threats by providing us with an understanding of the real risk posed by any given vulnerability. This white… Continue reading Exploit maturity: an introduction

Vulnerability management – cloud and remote working

For many organizations, vulnerability management remains a big concern. Security teams are accountable, but not responsible, for much of the risk mitigation process, and struggle to communicate its importance to different teams and stakeholders. Migration to the cloud has not helped this. While identifying vulnerabilities has become more straightforward, fixing them and managing the cyber… Continue reading Vulnerability management – cloud and remote working

Promote a special resource – guide/report etc. resource guide/report.

As attack surfaces grow and vulnerabilities mount, organizations look to their vulnerability management programs to respond to threats and keep them secure. But not all VM programs are created equal. In fact, many are limited in what they can offer in answer to security gaps in their unique environments. This white paper explains why some… Continue reading Promote a special resource – guide/report etc. resource guide/report.

Mapping CVEs to the MITRE ATT&CK framework

The cyber security industry is embracing and standardizing on the MITRE ATTACK framework, and concurrently we understand that vulnerability management by itself is not enough. We must combine risk-based vulnerability management with MITRE ATT&CK to expand our visibility and control of CVEs. This white paper explores how the Vulcan Cyber Voyager18 research team mapped relevant… Continue reading Mapping CVEs to the MITRE ATT&CK framework

How organizations can avoid cyber negligence

Attack surfaces have never been bigger, and cyber security teams are quickly overwhelmed by a growing threatscape. It’s easy to fall into a trap of cyber negligence, reacting from one crisis to another. But this is an unsustainable, short-sighted approach. This white paper – based on a Remediation Summit session from Ryan Gurney (CISO-in-residence at… Continue reading How organizations can avoid cyber negligence