Voyager18 logo WHITE

Cyber risk research

Leveraging machine-learning and data expertise to uncover vulnerability risk trends and insights.

Who are we?

The Vulcan Cyber Voyager18 research team is comprised of vulnerability risk data analysts and experts working to provide cyber security and SecOps teams with the vulnerability remediation intelligence they need to reduce cyber risk.


The team provides free tools and leading insights and research on the latest cyber risk trends including new attack types and vulnerability remediation actions.

Turning cyber expertise into community tools

Don’t go it alone. Use our free tools and community resources built for collaborative risk-based vulnerability management (RBVM) and vulnerability remediation. IT security and SecOps teams turn to Voyager18 tools to help get fix done.


MITRE Mapper

The Voyager18 team maps critical CVEs to their relevant MITRE ATT&CK tactics and techniques and provides the findings in the free MITRE Mapper tool. Search for high-impact vulnerabilities and find the best remediation path, and vice versa.



At the forefront of the Voyager18 team’s developments stands VulnRX, the world’s largest, searchable vulnerability remediation database. The curated database contains thousands of remediation actions, arming security teams with the most effective path to vulnerability risk mitigation. easily.



Cyber risk in 2022

The “Cyber Risk in 2022: a 360° View” research report explores the biggest developments and trends in cyber risk in 2022, and suggests ways to improve and maintain security posture in 2023.



Q2 2023 Vulnerability Watch

This quarter has been defined by an escalation in cyber threats, most prominently, the proliferation of zero-day vulnerabilities impacting a wide range of products and technologies. Even widely used platforms such as Google Chrome and Apache Superset have found themselves in the line of fire. Yet, amidst these prevailing concerns, a new and somewhat unconventional issue has emerged to the forefront of our attention – “AI package hallucination”. 

The team behind it all

Ortal Keizman

Head of Research

Lior Ben Dayan

Security Researcher

Karin Weinberg

Security Researcher

Yair Divinsky

Security Analyst

Yiftah Szoke

Data Analyst