Posted on Aug 18, 2022 7 minutes
How Safe Is Your VPN?
Did you know hackers can exploit 125 weaponized vulnerabilities in VPN products to attack their targets? CSW analysts deep dive into exposures in VPNs that could compromise organizational networks.
Posted on Jul 14, 2022 | Updated on Sep 06, 2022 5 minutes
All about BlackCat (AlphaV)
Did you know that the BlackCat ransomware group breached 60+ organizations in a single month? Read on to know about CSW's research into the ransomware group, the vulnerabilities they use, and their attack techniques and tactics.
Posted on Mar 2, 2022 | Updated on July 6, 2022 5 minutes
Latency Analysis of DHS CISA KEVs
In this blog, CSW experts analyzed CISA’s Known Exploited Vulnerabilities (KEV) list for latencies in publishing, exploiting, and patching to understand how fast attackers are weaponizing them for attacks.
Priya Ravindran, Sumeetha Manikandan
Posted on Nov 22, 2021 | Updated on Sep 26, 2022 5 minutes
CISA Releases a Directive Asking Organizations to Patch Known Exploited Vulnerabilities
The DHS Cybersecurity and Infrastructure Security Agency (CISA) released a directive with a list of 834 known and exploited vulnerabilities that public sector entities and organizations need to patch immediately!
Surojoy Gupta, Priya Ravindran, Pavithra Shankar