All Blog Posts
Revisiting CVE-2021-34527, also known as PrintNightmare
Exploring how you can use older vulnerabilities as part of effective deception operations
Backlog Crisis at the National Vulnerability Database
The NVD is struggling with a backlog of thousands of unprocessed CVEs, impacting CPE to CVE mappings, and leaving defenders in the dark on the vulnerability risk potential of their assets.
Leveraging Deception in Zero Trust
Deception contributes to achieving Zero Trust and defend from within the network perimeter.
What is Deception Technology
Deception technologies help security teams fight back by creating enticing decoy assets within their network that attackers can’t resist interacting with.
Vulnerabilities Long Tail
While new vulnerabilities continue to be discovered at a staggering pace, attackers focus on a much broader temporal spectrum. After all, it does not really matter which vulnerability is exploited, and older exploits are usually broadly available and stable.