Skip to main content

4 posts tagged with "Security Research"

Original security research and findings

View All Tags

The Ethics of Vulnerability Disclosure: Navigating the Gray Areas in 2024

· 11 min read
Chief Technology Officer
Senior Threat Intelligence Analyst

The discovery of CVE-2024-48293 sparked a fierce debate: the researcher waited 367 days for a vendor response before going public, resulting in 50,000 compromised systems within 48 hours. Was this responsible disclosure or reckless endangerment? As vulnerability discoveries reach record highs in 2024, the ethics of disclosure have never been more critical—or more contentious.

From Reactive to Proactive: Building a World-Class Threat Intelligence Program

· 13 min read
Senior Threat Intelligence Analyst
Security Architect

Most organizations operate in perpetual reactive mode—scrambling to respond to the latest vulnerability, chasing alerts, and hoping they're not the next headline. But what if you could see threats coming? What if you knew which vulnerabilities mattered before attackers exploited them? This comprehensive guide shows you how to build a threat intelligence program that transforms your security posture from reactive to proactive.

The AI Arms Race: How Machine Learning is Revolutionizing Both Cyber Attacks and Defense

· 7 min read
Chief Technology Officer
Senior Threat Intelligence Analyst

The cybersecurity landscape is witnessing an unprecedented transformation as artificial intelligence becomes the weapon of choice for both defenders and attackers. This technological arms race is reshaping how we think about security, vulnerability detection, and threat response. Today, we explore both sides of this double-edged sword and provide actionable strategies for staying ahead.

Decoding EPSS: How Machine Learning Predicts the Next Cyber Attack

· 9 min read
Chief Technology Officer
Vulnerability Research Lead

Imagine knowing which vulnerabilities attackers will target before they strike. What seemed like science fiction is now reality through the Exploit Prediction Scoring System (EPSS). This machine learning model, trained on millions of vulnerability observations, predicts exploitation probability with remarkable accuracy. Today, we'll decode how EPSS works, why it matters, and how to leverage it for proactive security.