Learn Search

Search across all Learn content

SecPod Labs

Security Research

In-depth CVE write-ups, vulnerability analysis, and security intelligence from the SecPod Research team.

Modern Vulnerability Management Aka Continuous Vulnerability and Exposure Management!

CVE Research

Modern Vulnerability Management Aka Continuous Vulnerability and Exposure Management!

In the face of a threat landscape that has evolved over the years, IT security teams still need to progress to eradicate the rising vulnerabilities. Even now, IT security teams rely on frustrating methods like isolated tools for each task, remediating all the flaws without prioritization, and more. ...

Jan 04, 2023 • 6 min read

Zero-day: Server Message Block (SMB) Server in Linux Kernel 5.15 Has a Critical Vulnerability!

CVE Research

Zero-day: Server Message Block (SMB) Server in Linux Kernel 5.15 Has a Critical Vulnerability!

Dec 25, 2022 • 2 min read

Automated Vulnerability Management is Not a Luxury but a Necessity!

CVE Research

Automated Vulnerability Management is Not a Luxury but a Necessity!

According to SecPod research statistics, 12000+ vulnerabilities are exploited with more than 15 zero-days in the first two quarters of 2022. This is done using a vulnerability management tool.

Dec 25, 2022 • 4 min read

Microsoft December 2022 Patch Tuesday Fixes 48 Vulnerabilities, Including 2 Zero-day!

CVE Research

Microsoft December 2022 Patch Tuesday Fixes 48 Vulnerabilities, Including 2 Zero-day!

Microsoft’s December 2022 Patch Tuesday has arrived, bringing fixes for two zero-day vulnerabilities, moreover, one of which is currently being exploited. As a result, 49 flaws are addressed with this patch, seven of which are rated as critical. Therefore, these critical flaws allow for remote code ...

Dec 14, 2022 • 4 min read

Hardening Systems to Ensure Continuous Compliance Using SanerNow

CVE Research

Hardening Systems to Ensure Continuous Compliance Using SanerNow

Every organization will have a set of regulations to which they must adhere. This regulation might differ on a timely basis or can constantly change. Keeping your organization aligned with up-to-date security standards is essential with System Hardening. A vulnerability management tool is also essen...

Dec 13, 2022 • 3 min read

What’s the Best Vulnerability Remediation Prioritization Method?

CVE Research

What’s the Best Vulnerability Remediation Prioritization Method?

You initiate vulnerability scanning in your network, and the scanner spits out an excel sheet with rows and rows of vulnerabilities that never seem to end. You have a colossal task ahead. The task of fixing the detected vulnerabilities identified by vulnerability scanning can be simplified with a vu...

Dec 12, 2022 • 5 min read

The Ultimate Vulnerability Assessment Checklist

CVE Research

The Ultimate Vulnerability Assessment Checklist

Vulnerability assessment is the process of identifying and assessing vulnerabilities. It makes up for a significant chunk of vulnerability management, and vulnerability management relies heavily on it.

Dec 12, 2022 • 4 min read

6 Questions to Ask Yourself Before Outsourcing Vulnerability Management

CVE Research

6 Questions to Ask Yourself Before Outsourcing Vulnerability Management

Consider that you are a FinTech enterprise, and your primary goal has nothing to do with security! Nevertheless, security (Managed vulnerability management) cannot be overlooked. Protecting your company from cyberattacks is highly important. Several industries have been under cyberattack recently, r...

Dec 12, 2022 • 4 min read

Fortinet Fixes Actively Exploited FortiOS SSL-VPN Flaw Allowing Remote Code Execution

CVE Research

Fortinet Fixes Actively Exploited FortiOS SSL-VPN Flaw Allowing Remote Code Execution

Dec 12, 2022 • 2 min read