Learn Search

Search across all Learn content

SecPod Labs

Security Research

In-depth CVE write-ups, vulnerability analysis, and security intelligence from the SecPod Research team.

Vulnerability Management Process: It’s More Than Just Detecting Vulnerabilities!

CVE Research

Vulnerability Management Process: It’s More Than Just Detecting Vulnerabilities!

Vulnerability Management is a process of identifying, evaluating based on priority, reporting, and remediating vulnerabilities in an organization’s IT network. It additionally includes security tools such as a vulnerability management tool, which does thousands of checks to gather information and re...

Mar 16, 2022 • 4 min read

5 Stages of Vulnerability Management Maturity Model: Know How Mature is your Model!

CVE Research

5 Stages of Vulnerability Management Maturity Model: Know How Mature is your Model!

In today’s rapidly evolving threat landscape, organizations face a constant barrage of vulnerabilities that can potentially expose their systems to cyber threats. To effectively address this challenge, a vulnerability management maturity model becomes essential. And a good vulnerability management t...

Mar 10, 2022 • 5 min read

Putting an End to IT Security Team’s Dilemma: Vulnerability Assessment vs Penetration Testing

CVE Research

Putting an End to IT Security Team’s Dilemma: Vulnerability Assessment vs Penetration Testing

Cybersecurity is essential to every enterprise as there is no sign of dipping of security threats. An increase in cybercrimes has led enterprises to implement various methods to prevent them. Even after such implementations, some security threats go undiscovered for months. While IT teams ask themse...

Mar 09, 2022 • 7 min read

Linux Kernel Vulnerabilities That Could Threaten Your Linux Security

CVE Research

Linux Kernel Vulnerabilities That Could Threaten Your Linux Security

When securing your Linux environment, you cannot miss the Linux Kernel. It forms the foundation of your Linux operating system and is the core interface between computer hardware and its processes. Linux Kernel is also loved and actively used by IT communities across the globe. Unlike the other oper...

Mar 08, 2022 • 2 min read

Microsoft’s March 22 Patch Tuesday Addresses 92 Security Vulnerabilities Including 3 Zero-days

CVE Research

Microsoft’s March 22 Patch Tuesday Addresses 92 Security Vulnerabilities Including 3 Zero-days

Mar 08, 2022 • 3 min read

Mozilla Fixes Two Actively Exploited Zero-Days in Firefox and Thunderbird

CVE Research

Mozilla Fixes Two Actively Exploited Zero-Days in Firefox and Thunderbird

Mozilla has released an out-of-band security update for Firefox, Firefox ESR, Firefox Focus, Firefox for Android, and Thunderbird, fixing two critical vulnerabilities (CVE-2022-26485, CVE-2022-26486). Mozilla is aware of the active exploitation of these vulnerabilities. Furthermore, when a patch is ...

Mar 07, 2022 • 3 min read

Organized Cyber Crime In The Digital Era, Not Your Regular Mafia

CVE Research

Organized Cyber Crime In The Digital Era, Not Your Regular Mafia

Cyberattacks have been around for over 30 years now. Organizations have witnessed and lived through the devastating effect of these attacks for quite some time now. When the pandemic hit the world, different spheres of life, including the workforce, incurred huge losses. With WFH and hybrid workforc...

Mar 03, 2022 • 5 min read

New-Age Cyber Hygiene Responsibilities Of Vulnerability Management Security Team Post-Pandemic

CVE Research

New-Age Cyber Hygiene Responsibilities Of Vulnerability Management Security Team Post-Pandemic

In today’s Information-rich era, data security is a top concern for organizations. As per the study, cyber-attacks are launched 2,244 times daily, i.e., every 39 seconds. An organization’s vulnerability management security team plays the most vital role in protecting sensitive data against informati...

Mar 02, 2022 • 4 min read

How Continuous Automated Vulnerability Management Differs from Traditional Programs

CVE Research

How Continuous Automated Vulnerability Management Differs from Traditional Programs

Vulnerability management services should offer end-to-end solutions that ensure you have a clear understanding of the cybersecurity risks. Security flaws that pose the highest risk to your enterprise can be addressed immediately. There are different types of vulnerability management services through...

Feb 23, 2022 • 5 min read