Try Vulcan Free: The only free tool for risk aggregation and prioritization | Get started now >>

Vulcan Cyber launches new Attack Path Graph feature | Learn more >>

CVE-2023-2640 & CVE-2023-32629: How to fix the new vulnerabilities in Ubuntu Kernel | Learn more >>

Understanding vulnerability risk: The best practice guide for cyber risk management, from Vulcan Cyber users | Read more >>

Try Vulcan Free: The only free tool for risk aggregation and prioritization | Get started now >>

Vulcan Cyber launches new Attack Path Graph feature | Learn more >>

CVE-2023-2640 & CVE-2023-32629: How to fix the new vulnerabilities in Ubuntu Kernel | Learn more >>

Understanding vulnerability risk: The best practice guide for cyber risk management, from Vulcan Cyber users | Read more >>

GET A DEMO

Cyber security 101

Learn the basics of cyber security and vulnerability risk management with these detailed guides and resources. 

CVE 101

Information from CVE (Common Vulnerabilities and Exposures) serves as a structured resource for cybersecurity professionals, aiding them in keeping abreast of threats and vulnerabilities that their organizations encounter. Beyond offering essential insights into prioritization and remediation, the cataloging of CVEs guarantees a unified dataset for the cybersecurity community – a critical factor when dealing with vulnerabilities in widespread software and systems.

Vulnerability management 101

As the landscape of threats continues to expand, so does the intricate domain of vulnerability management. It underscores not just the escalating seriousness of cyberattacks, but also starkly illuminates the level of preparedness (or lack thereof) of various organizations in the face of cyber threats.

 

Compliance 101

Cyber security compliance calls for organizations of all sizes to ensure at least a basic level of safeguarding for their systems and sensitive information. In this guide, we delve into the vital role of managing cyber risk and compliance, discussing essential laws and frameworks, identifying potential risks and challenges, and offering insights into the most effective solutions.

CAASM 101

In the current digital landscape, implementing cyber security measures demands unprecedented efforts. Continuous surveillance, amplified transparency, and smart automated analyses are necessary as attackers now harness the newest technological advancements. Consequently, companies must keep pace with CAASM, a broader approach to managing the attack surface.

Report

Q2 2023 Vulnerability Watch

This quarter has been defined by an escalation in cyber threats, most prominently, the proliferation of zero-day vulnerabilities impacting a wide range of products and technologies. Even widely used platforms such as Google Chrome and Apache Superset have found themselves in the line of fire. Yet, amidst these prevailing concerns, a new and somewhat unconventional issue has emerged to the forefront of our attention – “AI package hallucination”.