SecPod Labs
Security Research
In-depth CVE write-ups, vulnerability analysis, and security intelligence from the SecPod Research team.

CVE Research
How to Know if Vulnerable Applications in the Network Are Making Outbound Connections?
An outbound connection is a network connection going out of a particular device or network. Most, if not all, applications and devices in a network make outbound connections to send and receive data. So what if a hacker gets into the network by exploiting a vulnerable application and starts making d...

CVE Research
Implementing Gartner Vulnerability Management Recommendations with SanerNow
Vulnerability management is one of the most critical cybersecurity tasks for cyberattack prevention. But effective vulnerability management is not easy to achieve. Further, even with regular vulnerability assessments and patch cycles, organizations fail in audits and are often vulnerable to cyberatt...

CVE Research
Microsoft May 2023 Patch Tuesday Fixes 38 Vulnerabilities Including 3 Zero-day!
Microsoft has released its May 2023 Patch Tuesday updates, including fixes for 38 vulnerabilities. This month’s patch is considered one of the smallest in the number of resolved vulnerabilities. However, it is still crucial as it includes a patch for a Windows bug and a Secure Boot bypass flaw, whic...

CVE Research
Navigating the Patch Management Lifecycle: From Identification to Validation
Given the constant evolution and increasing sophistication of cyber-attacks, it is essential to have a strong patch management lifecycle and patch management software to ensure the security of computer systems. Software vulnerabilities, misconfigurations, and other issues can leave your organization...

CVE Research
A Step-by-Step Guide to Building a Strategic Vulnerability Management Policy
A vulnerability management policy is a set of guidelines and procedures that organizations use to manage vulnerabilities that are identified. Vulnerability management is a process of identifying, assessing, prioritizing, and mitigating vulnerabilities to protect IT infrastructure from cyberattacks. ...

CVE Research
Are Network Vulnerability Tools building your First Line of Cyber Defense?
Even with great vulnerability management software, your attack surface mitigation is based on the vulnerabilities you detect. And in the case of XYZ_Tech(imaginary example), the words were right on the mark. Be it regular vulnerability scans or rapid mitigation of the detected risks; the IT security...



