Latest Blogs About "Vulnerabilities"

9 total posts.

4 Min Read
Meltdown & Spectre: How to Secure Your SaaS Environment From Unknown Threats

Jonathan Harper

February 22, 2018

As a SaaS provider, securing your environment from known threats is one thing, but how about the unknown? That’s a different story altogether, and ...

6 Min Read
Meltdown & Spectre: What You Need to Know

Jonathan Harper

January 24, 2018

This post discusses the Meltdown and Spectre vulnerabilities, provides some proactive actions that can be taken to mitigate them, and also discusses ...

4 Min Read
The RNC Data Exposure: Learnings and Actions to Take

Natalie Walsh

June 23, 2017

Recently, headlines were hyping the largest ever exposure of voter information, involving some 9.5 billion data points related to 198 million U.S. ...

3 Min Read
Vulnerable vs. Exploitable: Why These are Different & Why it Matters

Anthony Alves

June 13, 2017

Pop quiz: What’s the difference between vulnerable and exploitable? As we’ve written before, a vulnerability is a weakness in a software ...

4 Min Read
Vulnerabilities and Exploits: What You Need to Know

Tim Armstrong

December 12, 2016

Exploits feed on vulnerabilities. Vulnerabilities, in turn, pave the way for exploits. These closely related security concepts are often confused, ...

2 Min Read
What’s on the Box!? An In-depth Look At OS Package Management

Lucas DuBois

March 29, 2016

Recently, I had the opportunity to help build out our vulnerability detection feature here at Threat Stack. I stepped into this project as I had many ...

5 Min Read
Introducing Vulnerability Management at the Workload Layer

Venkat Pothamsetty

February 23, 2016

You know that feeling you sometimes get after you’ve left the house for the day and suddenly fear you didn’t lock the door? You have two options: ...

4 Min Read
The Linux “Grinch” Vulnerability: Separating Fact From FUD

Jen Andre

December 18, 2014

Recently, a security firm reported what they claimed to be a flaw with a major impact on organizations running Linux. (And apparently since all the ...

3 Min Read
CVE-2014-6271 And You: A Tale Of Nagios And The Bash Vulnerability

Jen Andre

September 25, 2014

The internet is yet again feeling the aftereffects of another “net shattering” vulnerability: a bug in the shell ‘/bin/bash’ that widely ...