CVE Program BlogCNA Rules Version 4.0 Update and TransitionThe CVE Program, Board members and CNA staff, have been working on rewriting the CVE Numbering Authority (CNA) Operational Rules Version…3 min read·1 day ago--
Christina LekatiOSINT Techniques for Sensitive Documents That Have Escaped Into The Clear WebI have been working full-time in this industry for about 8 years. Part of my work involves conducting vulnerability assessments for…7 min read·Mar 6, 2024--
Hassen HannachiInstalling OpenVAS on Kali LinuxOpenVAS, an endpoint scanning application and web application used to identify and detect vulnerabilities. It is widely used by companies…8 min read·Mar 2, 2024----
Snarky SecurityRisk-Based Approach to Vulnerability Prioritization by Health-ISAC — Snarky SecurityUnpacking with more detail: check PDF or mirror PDF4 min read·14 hours ago----
Alex ChantavyinLyft EngineeringVulnerability Management at Lyft: Enforcing the Cascade [Part 1]13 min read·Nov 17, 2022--6--6
CVE Program BlogCNA Rules Version 4.0 Update and TransitionThe CVE Program, Board members and CNA staff, have been working on rewriting the CVE Numbering Authority (CNA) Operational Rules Version…3 min read·1 day ago--
Christina LekatiOSINT Techniques for Sensitive Documents That Have Escaped Into The Clear WebI have been working full-time in this industry for about 8 years. Part of my work involves conducting vulnerability assessments for…7 min read·Mar 6, 2024--
Hassen HannachiInstalling OpenVAS on Kali LinuxOpenVAS, an endpoint scanning application and web application used to identify and detect vulnerabilities. It is widely used by companies…8 min read·Mar 2, 2024--
Snarky SecurityRisk-Based Approach to Vulnerability Prioritization by Health-ISAC — Snarky SecurityUnpacking with more detail: check PDF or mirror PDF4 min read·14 hours ago--
Alex ChantavyinLyft EngineeringVulnerability Management at Lyft: Enforcing the Cascade [Part 1]13 min read·Nov 17, 2022--6
D.HaddadinOSINT TEAM20 Tools You Should Know as a Security AnalystMy last article “15 Tools you should know as a security analyst” turned out to be well received by many viewers. Such success prompted me…·12 min read·Mar 19, 2024--2
Marc WhiteThe Power of Vulnerability: Embracing Authenticity in an Instagram-Perfect World.In a world dominated by carefully curated images and meticulously crafted personas, the concept of vulnerability can seem out of place.·3 min read·2 days ago--2
Cybertech MavenPenetration Testing Series: Hacking Metasploitable 2 By Exploiting VNC Port 59005 min read·Jul 19, 2023--1