mathstodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance for maths people. We have LaTeX rendering in the web interface!

Server stats:

2.7K
active users

#softwarevulnerability

0 posts0 participants0 posts today
Bytes Europe<p>Evolve Faster Than the Threats or Get Left Behind <a href="https://www.byteseu.com/920487/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">byteseu.com/920487/</span><span class="invisible"></span></a> <a href="https://pubeurope.com/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://pubeurope.com/tags/ArtificialIntelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ArtificialIntelligence</span></a> <a href="https://pubeurope.com/tags/ComputerSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ComputerSecurity</span></a> <a href="https://pubeurope.com/tags/CyberNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberNews</span></a> <a href="https://pubeurope.com/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://pubeurope.com/tags/CyberSecurityNewsToday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNewsToday</span></a> <a href="https://pubeurope.com/tags/CyberSecurityUpdates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityUpdates</span></a> <a href="https://pubeurope.com/tags/CyberUpdates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberUpdates</span></a> <a href="https://pubeurope.com/tags/CyberAttacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberAttacks</span></a> <a href="https://pubeurope.com/tags/DataBreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataBreach</span></a> <a href="https://pubeurope.com/tags/HackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerNews</span></a> <a href="https://pubeurope.com/tags/HackingNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackingNews</span></a> <a href="https://pubeurope.com/tags/HowToHack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HowToHack</span></a> <a href="https://pubeurope.com/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InformationSecurity</span></a> <a href="https://pubeurope.com/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://pubeurope.com/tags/RansomwareMalware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RansomwareMalware</span></a> <a href="https://pubeurope.com/tags/SoftwareVulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoftwareVulnerability</span></a> <a href="https://pubeurope.com/tags/TheHackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TheHackerNews</span></a></p>
Bytes Europe<p>Microsoft Patches Critical Azure AI Face Service Vulnerability with CVSS 9.9 Score <a href="https://www.byteseu.com/713780/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="">byteseu.com/713780/</span><span class="invisible"></span></a> <a href="https://pubeurope.com/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://pubeurope.com/tags/ArtificialIntelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ArtificialIntelligence</span></a> <a href="https://pubeurope.com/tags/ComputerSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ComputerSecurity</span></a> <a href="https://pubeurope.com/tags/CyberNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberNews</span></a> <a href="https://pubeurope.com/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://pubeurope.com/tags/CyberSecurityNewsToday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNewsToday</span></a> <a href="https://pubeurope.com/tags/CyberSecurityUpdates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityUpdates</span></a> <a href="https://pubeurope.com/tags/CyberUpdates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberUpdates</span></a> <a href="https://pubeurope.com/tags/CyberAttacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberAttacks</span></a> <a href="https://pubeurope.com/tags/DataBreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataBreach</span></a> <a href="https://pubeurope.com/tags/HackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerNews</span></a> <a href="https://pubeurope.com/tags/HackingNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackingNews</span></a> <a href="https://pubeurope.com/tags/HowToHack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HowToHack</span></a> <a href="https://pubeurope.com/tags/InformationSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InformationSecurity</span></a> <a href="https://pubeurope.com/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://pubeurope.com/tags/RansomwareMalware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RansomwareMalware</span></a> <a href="https://pubeurope.com/tags/SoftwareVulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoftwareVulnerability</span></a> <a href="https://pubeurope.com/tags/TheHackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TheHackerNews</span></a></p>
Alexandre Dulaunoy<p>Visualizing vulnerability metrics by merely counting the CVEs per vendor might provide insights into vendors with robust vulnerability disclosure processes. However, it is essential not to overlook the significant blind spot represented by vendors who fail to report any CVEs at all.</p><p>It is crucial to consider the broader picture by acknowledging the existence of vendors who do not actively fill any CVEs, potentially indicating deficiencies in their vulnerability management and disclosure procedures.</p><p>The challenge lies in quantifying unreported vulnerabilities and identifying vendors that fall into this category. How can we account for what has not been disclosed, and how do we go about identifying such vendors?</p><p><a href="https://infosec.exchange/tags/cve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cve</span></a> <a href="https://infosec.exchange/tags/softwarevulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>softwarevulnerability</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a></p>
IT News<p>How to Build an Effective Vulnerability Management Program - To manage vulnerabilities in your company effectively, it is worth going through s... - <a href="https://readwrite.com/how-to-build-an-effective-vulnerability-management-program/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">readwrite.com/how-to-build-an-</span><span class="invisible">effective-vulnerability-management-program/</span></a> <a href="https://schleuss.online/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilitymanagement</span></a> <a href="https://schleuss.online/tags/softwarevulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>softwarevulnerability</span></a> <a href="https://schleuss.online/tags/softwarepatching" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>softwarepatching</span></a> <a href="https://schleuss.online/tags/dataandsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataandsecurity</span></a> <a href="https://schleuss.online/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> <a href="https://schleuss.online/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://schleuss.online/tags/cyberattack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberattack</span></a></p>
ITSEC News<p>Critical Cisco Bug Opens Software Licencing Manager to Remote Attack - A default password would let anyone access the Cisco Smart Software Manager On-Prem Base platform,... more: <a href="https://threatpost.com/critical-cisco-bug-software-licencing-remote-attack/153086/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">threatpost.com/critical-cisco-</span><span class="invisible">bug-software-licencing-remote-attack/153086/</span></a> <a href="https://schleuss.online/tags/ciscosmartsoftwaremanageron" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ciscosmartsoftwaremanageron</span></a>-prembase <a href="https://schleuss.online/tags/highavailabilityservice" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>highavailabilityservice</span></a> <a href="https://schleuss.online/tags/softwarevulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>softwarevulnerability</span></a> <a href="https://schleuss.online/tags/softwarelicensing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>softwarelicensing</span></a> <a href="https://schleuss.online/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> <a href="https://schleuss.online/tags/defaultpassword" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>defaultpassword</span></a> <a href="https://schleuss.online/tags/cve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cve</span></a>-2020-3158 <a href="https://schleuss.online/tags/criticalflaw" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>criticalflaw</span></a> <a href="https://schleuss.online/tags/remoteattack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>remoteattack</span></a> <a href="https://schleuss.online/tags/management" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>management</span></a> <a href="https://schleuss.online/tags/cisco" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cisco</span></a></p>