Recent Blogs
Executive Summary
Vulnerability Description
CVE-2025-53786 is an Elevation of Privilege (EoP) flaw in hybrid Microsoft Exchange Server deployments. Attackers with administrative rights on an on-p...
Aug 12, 20258.7KViews
3likes
0Comments
Why transition to CVSS v4?
The Common Vulnerability Scoring System (CVSS) is the global standard for assessing vulnerability severity. As leading institutions like the National Vulnerability Datab...
Mar 20, 20251.2KViews
1like
0Comments
4 MIN READ
A new critical vulnerability affecting PAN-OS has been identified and published last week, putting organizations using Palo Alto Networks’ firewalls at risk. In this blog post, we will demonstrate ho...
Nov 26, 20242.8KViews
0likes
0Comments
3 MIN READ
A new critical Remote Code Execution (RCE) vulnerability affecting CUPS (Common Unix Printing System) has been identified, putting at risk organizations with Unix. In this blogpost we will demonstrat...
Oct 02, 20246.8KViews
0likes
0Comments
Guidance to ensure your organization's Android devices have the latest security updates
Aug 27, 20243.4KViews
0likes
0Comments
4 MIN READ
Boost security by prioritizing vulnerabilities affecting your critical assets
Aug 14, 20246.1KViews
1like
1Comment
Guidance on how to use export API to extract vulnerability data , build custom reports, integrate with Microsoft Intune and 3 rd party tools, and more.
Jul 24, 202413KViews
3likes
1Comment
Guidance on how to assess potential exposure of the latest "regreSSHion" vulnerability using the integrated security tools from Microsoft
Jul 08, 202415KViews
2likes
2Comments
On April 12, Palo Alto Networks released a security advisory on CVE-2024-3400, a critical vulnerability affecting several versions of PAN-OS, the operating system that runs on the company’...
Apr 15, 20247.6KViews
3likes
0Comments
Latest information about XZ Utils vulnerability and guidance on how to assess your potential exposure.
Apr 02, 202471KViews
7likes
1Comment
Resources
Tags
- Threat & Vulnerability Management33 Topics
- microsoft defender for endpoint6 Topics
- apis3 Topics
- vulnerability assessment3 Topics
- Vulnerability3 Topics
- Advanced hunting2 Topics
- macos2 Topics
- secure configuration assessment2 Topics
- vulnerabilities2 Topics