Attend the CyberRisk Summit – for free: Join us May 23 to learn how cyber experts put vulnerability risk in context | Register >>
Vulnerability management metrics: The key metrics that will help you achieve successful cyber risk management | Read more >>
CVE-2023-32784 in KeePass: How to fix the KeePass password manager vulnerability | Read more >>
Attend the CyberRisk Summit – for free: Join us May 23 to learn how cyber experts put vulnerability risk in context | Register >>
Vulnerability management metrics: The key metrics that will help you achieve successful cyber risk management | Read more >>
CVE-2023-32784 in KeePass: How to fix the KeePass password manager vulnerability | Read more >>
Leveraging machine-learning and data expertise to uncover vulnerability risk trends and insights.
The Vulcan Cyber Voyager18 research team is comprised of vulnerability risk data analysts and experts working to provide cyber security and SecOps teams with the vulnerability remediation intelligence they need to reduce cyber risk.
The team provides free tools and leading insights and research on the latest cyber risk trends including new attack types and vulnerability remediation actions.
Don’t go it alone. Use our free tools and community resources built for collaborative risk-based vulnerability management (RBVM) and vulnerability remediation. IT security and SecOps teams turn to Voyager18 tools to help get fix done.
The Voyager18 team maps critical CVEs to their relevant MITRE ATT&CK tactics and techniques and provides the findings in the free MITRE Mapper tool. Search for high-impact vulnerabilities and find the best remediation path, and vice versa.
At the forefront of the Voyager18 team’s developments stands VulnRX, the world’s largest, searchable vulnerability remediation database. The curated database contains thousands of remediation actions, arming security teams with the most effective path to vulnerability risk mitigation. easily.
The “Cyber Risk in 2022: a 360° View” research report explores the biggest developments and trends in cyber risk in 2022, and suggests ways to improve and maintain security posture in 2023.
Q1 2023 saw vulnerabilities affecting popular applications, including Google Chrome, Jira, and Microsoft Office. This report provides technical specifications for each vulnerability, including CVSS and EPSS severity scores, impact, and more. It also focuses on systems management tools and services, which were particularly vulnerable in Q1 2023.