New Google vulnerability: Learn about zero-day CVE-2022-3075 in Chorme web browser  | Fix now >> 

The CyberRisk Summit on-demand: Watch the latest #CRS anytime, anywhere | Watch now  >>

New report: Mapping MITRE ATT&CK framework to CVEs |  Read more  >>

What Is remediation in cyber security?

If you use computers for business or personal use, you know that computer security is a high priority. Even if you use anti-virus software, cyber attacks are common. These threats are pervasive in nature and are often financially motivated.  If you’re a business owner, you need to be on high alert when it comes to… Continue reading What Is remediation in cyber security?

7 lessons learned about cyber risk from the Remediation Summit 2021

Last week we hosted the third, semi-annual Remediation Summit by Vulcan Cyber. Firstly, we’d like to thank more than 200 attendees who participated in the virtual event and our keynote speakers, who talked all things cyber risk:  Matthew Hurewitz, Associate Director, Application Security & Security Architecture, Best Buy, Ryan Gurney – YL Ventures CISO-in-Residence, YL… Continue reading 7 lessons learned about cyber risk from the Remediation Summit 2021

CVE-2021-41773: What it is and how to fix it

The Apache HTTP server is one of the most common HTTP server frameworks on the internet. Yesterday (October 5th 2021), Apache released a security patch that fixes a critical vulnerability in their project – CVE-2021-41773. This vulnerability was disclosed by Ash Daulton and the CPanel security team on September 29 – not long after Apache… Continue reading CVE-2021-41773: What it is and how to fix it

Multi-cloud security: what you need to know

The multi-cloud approach is becoming increasingly popular among companies looking to take advantage of its agility, innovation, potential cost savings, and the flexibility to choose the best of what each cloud provider has to offer based on your needs. According to Gartner’s 2020 survey, 81% of public cloud users reported they were using the services… Continue reading Multi-cloud security: what you need to know

Why we’re still seeing unpatched software

Despite industry awareness that 60% of data breaches stem from unpatched software, “fix” still doesn’t get done. And how about these statistics from the 2020 Veracode software security report? Do they match your organization’s patch rates? 70% of bugs remain unpatched after 4 weeks. 55% of bugs remain unpatched three months later. 25% of high-vulnerability… Continue reading Why we’re still seeing unpatched software

How to fix the returning CVE-2013-0229 & CVE-2012-5958

There’s a saying: “Everything old is new again.” That may be fine when it comes to fashion and nostalgic movies, but when it comes to “vintage” vulnerabilities, the situation can quickly become dangerous. When a vulnerability like CVE-2013-0229 or CVE-2012-5958 goes unremediated for an extended period of time, sometimes it can be forgotten entirely, or… Continue reading How to fix the returning CVE-2013-0229 & CVE-2012-5958

Application Security programs in 2021

Application security has emerged as a popular target for attackers in 2021. Developers continue to release new features and capabilities at pace, leaving security gaps ready to be exploited. But as the list of vulnerabilities grows, are security professionals keeping up? Consolidating data from Forrester, Barracuda, Edgescan, and our own research with Pulse – this… Continue reading Application Security programs in 2021

CVE-2021-34550: One of July’s most searched vulnerabilities and how to fix it

Vulcan Cyber is your security partner when it comes to identifying and fixing vulnerabilities. One of the ways we give back to the community is through Vulcan Remedy Cloud, the world’s largest free and curated database of reliable vulnerability solutions. Vulcan Remedy Cloud offers you detailed information to help your team remediate today’s most concerning… Continue reading CVE-2021-34550: One of July’s most searched vulnerabilities and how to fix it

5 Azure Security Tools You Should Know About

As an increasing number of organizations adopt cloud as the target platform for their business critical workloads, securing these workloads has become a top priority. Establishing a well-defined risk management strategy that covers the entire stack—infrastructure, the application layer, and cloud-specific security controls—is the first step in improving your company’s cyber hygiene. If you are… Continue reading 5 Azure Security Tools You Should Know About

5 GCP Security Tools You Should Know About (July 2022 update)

Whether your organization was born in the cloud or is aiming to modernize its IT landscape through cloud adoption, having a well-defined and comprehensive cloud security program is crucial. Managing security in the cloud calls for different strategies than managing security in networks or applications surfaces, and requires a paradigm shift due to the constantly… Continue reading 5 GCP Security Tools You Should Know About (July 2022 update)