We welcome the launch of http://db.gcve.eu, an open, European-operated vulnerability advisory database strengthening digital sovereignty and multi-source intelligence.

At CrowdSec, we believe this multi-source, sovereignty-driven approach is essential. And we complement it with real-world exploitation evidence from production telemetry through our Live Exploit Tracker.

Defenders don’t just need more data; they need trustworthy, actionable signals.

👉 Read more: https://crowdsec.net/blog/crowdsec-welcomes-db-gcve-eu-boosting-europes-vulnerability-intelligence

#cybersecurity #vulnerabilityintelligence #digitalsovereignty #opensourcesecurity #threatintelligence

Vulnerability-Lookup

Vulnerability-Lookup - Fast vulnerability lookup correlation from different sources.

🧠 EDR Tools Are Not Exposure Management Solutions.

They’re reactive, not proactive - designed to respond after compromise, not prevent it.
EDR misses entire classes of assets like routers, IoT, and third-party systems.

💬 What’s your approach to achieving full attack surface visibility?

Follow @technadu for more discussions on vulnerability intelligence and exposure reduction.

#CyberSecurity #ExposureManagement #EDR #Tenable #InfoSec #ThreatDetection #VulnerabilityIntelligence #TechNadu

We Speak CVE Podcast episode 29 now available!
“The CVE Consumer Working Group (CWG)”
https://youtu.be/PetT7jdf7Pc

#cve #vulnerability #vulnerabilitymanagement #vulnerabilityintelligence #cybersecurity
We Speak CVE Podcast episode 25 now available!
“Expected Impact of the CNA Rules 4.0”
https://youtu.be/ASJy3WI2JNc

#CVE #Vulnerability #VulnerabilityManagement #VulnerabilityIntelligence #Cybersecurity
Podcast – Expected Impact of the CNA Rules 4.0

YouTube
We Speak CVE Podcast episode 24 now available!
“Swimming in Vulns (or, Fun with CVE Data Analysis)”
https://youtu.be/Pzt75EkqnPs

#CVE #Vulnerability #VulnerabilityManagement #VulnerabilityIntelligence #Cybersecurity
Podcast – Swimming in Vulns (or, Fun with CVE Data Analysis)

YouTube
In our latest blog, VulnCheck's lead threat researcher @albinolobster takes a closer look at the open-source intelligence surrounding CVE-2022-1388 and the exploit variants on GitHub. Click the link below for the complete technical analysis: https://vulncheck.com/blog/new-cve-2022-1388
#vulnerabilityintelligence #exploitintelligence
Finding Something New About CVE-2022-1388 - Blog - VulnCheck

In search of an interesting new detail about CVE-2022-1388, VulnCheck researchers pore over open source intelligence. The researchers detail exploit variants, find signature bypasses, and publish a novel exploit variant.

Finding Something New About CVE-2022-1388 - Blog - VulnCheck

Last week, VulnCheck's lead threat researcher, @albinolobster, published a detailed comparison of Exploit-DB and 0day.today.

Check out our latest blog as we answer our reader's top questions and look deeper at the #vulnerabilities in these exploit databases: https://vulncheck.com/blog/exploit-database-followup
#vulnerabilityintelligence #exploitintelligence

A Follow-up to the Exploit-DB and 0day.today Comparison - Blog - VulnCheck

Following reader suggestions, we take a deeper look at the types of vulnerabilities in the Exploit-DB and 0day.today exploit databases. We also examine exploit attack vectors and find out how many of the exploits have been used in the wild.

A Follow-up to the Exploit-DB and 0day.today Comparison - Blog - VulnCheck

VulnCheck’s lead threat researcher,@albinolobster, shares a detailed comparison of Exploit-DB and 0day.today. Check out our latest blog for a deeper understanding of these exploit databases and how they differ. https://vulncheck.com/blog/edb-0day-compare

#vulnerabilityintelligence #exploitintelligence

A Comparison of Exploit-DB and 0day.today - Blog - VulnCheck

Exploit-DB and 0day.today are two of the largest public exploit databases. In this blog, we compare the databases to determine which one is the most relevant today.

A Comparison of Exploit-DB and 0day.today - Blog - VulnCheck