New Google vulnerability: Learn about zero-day CVE-2022-3075 in Chorme web browser  | Fix now >> 

The CyberRisk Summit on-demand: Watch the latest #CRS anytime, anywhere | Watch now  >>

New report: Mapping MITRE ATT&CK framework to CVEs |  Read more  >>

Fixing the Intel Spectre CPU Vulnerability

Years ago we published a blog post about the Spectre and Meltdown vulnerabilities, the common variations of a vulnerability built into most modern microprocessors serving many of the machines and computers in the world. Now, three years later, they return to haunt us. Using remediation intelligence provided by Vulcan Remedy Cloud, this blog post will… Continue reading Fixing the Intel Spectre CPU Vulnerability

Exploited Vulnerabilities Drive Remediation Urgencies

Knowing what NOT to do can sometimes be just as helpful as knowing the right thing to do. Oftentimes, CISOs and Vulnerability Managers have plans and practices in place that can actually be making matters worse by focusing on the wrong things. Let’s review some of these mistakes so you can avoid them in your… Continue reading Exploited Vulnerabilities Drive Remediation Urgencies

Looking Back – The Top Vulnerabilities of 2018

However you flip the number of recorded vulnerabilities in a given year, the number is at once humbling and noteworthy. We know that both actions – remediating all vulnerabilities and prioritizing a high-severity security flaw in a little-used, low-value system over a medium-severity security hole in a mission-critical system – leave your company’s most important… Continue reading Looking Back – The Top Vulnerabilities of 2018

Putting Meltdown and Spectre Vulnerabilities in Perspective

For several months in early 2018, you could not open a browser without seeing news about Spectre and Meltdown – the variants of a vulnerability built in to just about every computer chip on the planet. Discovered in late 2017 by researcher Michael Schwarz at Graz University of Technology in Austria, Spectre and Meltdown actually… Continue reading Putting Meltdown and Spectre Vulnerabilities in Perspective