GET A DEMO

Vulnerability disclosure policy (and how to get it right)

Every company strives to maintain the highest possible security for their products. Nonetheless, security vulnerabilities are bound to exist in any system. Identifying these vulnerabilities is therefore key. However, what an organization does with its vulnerability data varies from company to company based on its vulnerability disclosure policy. In this article, we define a vulnerability… Continue reading Vulnerability disclosure policy (and how to get it right)

What is the BootHole Vulnerability (CVE-2020-10713)?

TL;DR The BootHole vulnerability is not critical (yet), but it could potentially affect billions of devices worldwide. Exploiting it requires high privileges or physical access. Now while there are no full patches available at this time, we’ve written this blog, and published this episode of The Vulnerability Report, to help you detect vulnerable devices, mitigate the… Continue reading What is the BootHole Vulnerability (CVE-2020-10713)?

The Staggering Growth in Vulnerability Disclosure, 2010 – 2018

With the end of the year, it’s prime time to reflect on vulnerability trends since the start of the decade.