GET A DEMO

SIEM detection gaps and more: first officer’s blog – week 59

The ongoing voyages of the Federation Support Ship USS [REDACTED]  First Officer’s log, Terrestrial date, 20230703, Officer of the Deck reporting.   When the Captain’s first words after explaining a situation are “that would be a no,” you can be sure the situation itself was not optimal. Or, in this case, something that would be subject… Continue reading SIEM detection gaps and more: first officer’s blog – week 59

Vulcan Cyber Launches the Voyager18 Research Team

Voyager18 is the first cybersecurity research team to focus exclusively on vulnerability risk remediation intelligence Tel Aviv, Israel  – February 16, 2023 –  Vulcan Cyber, developers of the cyber risk management platform for infrastructure, application and cloud vulnerabilities, today announced the launch of the Voyager18 research team, the first in the industry to focus exclusively… Continue reading Vulcan Cyber Launches the Voyager18 Research Team

CWE top 25 most dangerous software weaknesses in 2022 – what they mean

As application development accelerates, so must security within this environment. Fortunately, there are many tools and resources to help security teams navigate the increasing threatscape of application security, not least from MITRE, who have released their latest list of software vulnerabilities.  Here’s everything you need to know about the 2022 CWE top 25 most dangerous… Continue reading CWE top 25 most dangerous software weaknesses in 2022 – what they mean

The MITRE ATT&CK framework and more – introducing Voyager18

Spend any time in cyber security, and you’ll know how deep the vulnerability rabbit hole goes. Log4j. Spring4shell. Follina. The list goes on and on and on. Security researchers and bug bounty hunters trawl the sprawling wild west of application, network, and cloud environments, in search of the critical openings that might let an attacker… Continue reading The MITRE ATT&CK framework and more – introducing Voyager18

Remediating the MITRE framework and att&ck with VM

Update June 2022: The Vulcan Cyber research team, aka “Voyager18” has worked on mapping CVEs to relevant tactics and techniques from the MITRE ATT&CK matrix. Visit the dedicated site here.    While vulnerability management isn’t natively mapped to the MITRE ATT&CK framework by default, using cyber knowledge, data science, machine learning and artificial intelligence, CVEs can be efficiently integrated with ATT&CK in a way that delivers distinct advantages… Continue reading Remediating the MITRE framework and att&ck with VM