Welcome to Smokey's Security Forums.
Guests only have limited access to the board and it's features, please consider registering to gain full access!
Registration is free and it only takes a few moments to complete.

Smokey's Security Forums

Please login or register.

Login with username, password and session length
Advanced search  

News:

New Trojan malware campaign sends users to fake banking site that looks just like the real thing

Trickbot malware redirects to counterfeit site that displays the correct URL and the digital certificate of the genuine alternative.

New Trojan malware campaign sends users to fake banking site that looks just like the real thing

Malware Log Analysis & Removal Help * Ransomware Encryption & Decrytion Techniques * Official Jetico Inc. Support Forums

Share this topic on FacebookShare this topic on MySpaceShare this topic on RedditShare this topic on TwitterAuthorTopic: Most Vulnerabilities Discussed Online or on Dark Web Before NVD Publication  (Read 16 times)

0 Members and 1 Guest are viewing this topic.

GilbertTopic starter

  • Updates Moderator
  • *
  • Offline Offline
  • location: Arctic
  • Posts: 30918
Most Vulnerabilities Discussed Online or on Dark Web Before NVD Publication
8 June 2017, 9:07 pm

Discovered vulnerabilities are most often first reported over news sites, blogs, social media pages and the dark web, or paste sites, before being published in NIST's National Vulnerability Database (NVD). 

Reporting vulnerabilities is essential for everyone's online security, and this is something that often happens with most companies - researchers dig deep, find something that's not right, exploit it, and report it to the company so they can fix it. This scenarios makes us all safer when browsing the Internet, using apps and tools. 

Threat intel firm Recorded Future, however, has noticed that a lot of these vulnerabilities are first discussed online before even being reported or making it into the NVD. 

"The disparity between the unofficial and official communication of CVEs is placing a greater onus on CISOs and security teams, leaving them unknowingly open to potential exploits and u... (read more)

Source: Softpedia News / Security

>> To obtain the full Softpedia Security News article, click the link in the first post line <<
 

* Permissions
You can't post new topics.
You can't post replies.
You can't post attachments.
You can't modify your posts.
BBCode Enabled
Smilies Enabled
[img] Enabled
HTML Disabled


Except where otherwise stated, all content, graphics, banners and images included © 2006 - 2017 Smokey Services™ -- All rights reserved
Design board graphics, banners and images by Meg&Millie - Emma aka Tinker

This site does not store profiling-, tracking-, third-party and/or any other non-essential cookie(s) on client computers and is fully compliant with the EU ePrivacy Directive
Smokey's does not use any Web Analytics/Analysis Service, and also does not use any browser fingerprinting techniques

    

  

Smokey's also provides free fully qualified FRST (Farbar Recovery Scan Tool) Log / Malware Analysis & Removal Help and System Health Checks
rifle
rifle
rifle
rifle