We are extremely pleased to announce the availability of our vFeed Vulnerability & Threat Intelligence Professional Services. We took the time to do things well. Several parallel projects were conducted and achieved during the year 2017.
vFeed IO understands the security challenges our customers may face to address in our today’s complex network environments. Hence, vFeed IO is proud to announce a program that supports and enables industry-leading technology companies and new pioneer startups. vFeed IO Technology and Third Party Integration Program (T2PI) is an effective opportunity for companies to create […]
With the standardization of the Internet of Things (IoT) label, the public is gradually becoming aware of its wide use in almost all fields. And with this democratization we are confronted with this old and inherent problem: Security. And for good reason, IoT have become in the recent years the cyber-attackers preferred targets. In fact […]
Here is a cool article written by Kin Lane the author the renowned blog API Evangelist about the vFeed approach. The author discusses our model from a technical and business perspective and what would be the perfect solution in a perfect world. However, we had intentionally geared our development towards a Python API for various […]
The vFeed vulnerability & threat intelligence Community Edition database has been updated with +3000 new CVEs and hundreds of cross-links references (Microsoft Bulletins / Advisories, Metasploit, OpenVAS, Nessus, Nmap, OVAL, Snort, Suricata and more).
The vFeed vulnerability & threat intelligence Consultancy & Integrator Plans database has been updated with +104 new CVEs and hundreds of cross-linked references (Metasploit, OpenVAS, Nessus, Nmap, OVAL, Snort, Suricata and more). If you are not registered, you can check-out for free the community edition here Registered users and customers may use the automated update […]
The vFeed vulnerability & threat intelligence Consultancy & Integrator Plans database has been updated with +20 new CVEs and hundreds of cross-linked references (Metasploit, OpenVAS, Nessus, Nmap, OVAL, Snort, Suricata and more. Besides, the database now supports the new CWE and CAPEC versions. Our database has incorported the major changelog from both standards such as:
A student from the Univesity of Bochum in Germany have published a very interesting thesis regarding the security of network printers. His work is a survey of weaknesses in the standards and various proprietary extensions of two popular printing languages: PostScript and PJL.
vFeed the Vulnerability and Threat Community Edition has been integrated into distribution ArchStrike. ArchStrike is a penetration testing and security layer on top of Arch Linux. It follows the Arch Linux standards very closely in order to keep the packages clean, proper and easy to maintain.
I often hear clients and users request applications list of features and among their question appears: Do you guys provide a web service or RESTful API ? Although the API approach has opened a new era of interoperability between systems and solutions, has greatly reduced the connectivity effort and simplified life to many of us. […]