Almost for as long as computers have been around, there have been vulnerabilities and individuals willing to exploit them for their gain, and your detriment. These vulnerabilities aren’t decreasing, but actually increasing as the complexity and diversity of our technologies and software systems expand over time. In many cases, these vulnerabilities are picked up by […]

Security company ClearSky has released few days ago a very detailed report about Iranian hackers Group that have targeted large companies from the IT, Telecommunication, Oil and Gas, Aviation, Government, and Security sectors around the world in order to plant backdoors. In this post, we will show you how our vFeed indicators could have been […]

The number of vulnerabilities continues to increase so much that the technical teams in charge of the patch management find themselves drowning in a myriad of critical and urgent tasks. Therefore we have taken the time to review the profile of the most critical vulnerabilities & issues that impacted year 2019. After this frenzy during […]

We are happy to announce that, due to our astounding growth over the last year, we are heading to RSA Conference 2020. While you’re at the Moscone Center in San Francisco, visit vFeed’s booth No. 1 at the RSA Conference (Early Stage Expo Floor) during Expo hours. The team will be there performing demos and making sure to […]

In a recent academic paper “A survey on vulnerability assessment tools and databases for cloud-based web applications” released in ScienceDirect by 4 reseachers and associate Professors at the Computer Science Department, University of Crete and collaborating researcher at the Institute of Computer Science (ICS), Foundation for Research and Technology – Hellas (FORTH).

These past few months have been very productive. We have progressed on several tasks all related and  focused on our sole objective to enrich our vulnerability intelligence database. And the strenght of our solution comes from the simplicity in which we have turned the complexity of large vulnerability data collection, classification and aggregation into the […]