Jan. 17, 2024, 2:05 p.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news

The escalating number of vulnerabilities in the digital landscape demands a vigilant approach from the cybersecurity community. However, merely identifying vulnerabilities is not enough; understanding which ones have been exploited in the wild is crucial for effective defense strategies.


A prominent resource in this quest for threat intelligence is the Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEV) Catalog. This catalog serves as a valuable guide, meticulously pinpointing vulnerabilities that cunning threat actors exploit to compromise security. It …

cisa cisa kev community cybersecurity cybersecurity community defense defense strategies demands digital digital landscape exploited infrastructure intelligence kev problems quest resource strategies threat threat intelligence understanding vulnerabilities

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Open-Source Intelligence (OSINT) Policy Analyst (TS/SCI)

@ WWC Global | Reston, Virginia, United States

Security Architect (DevSecOps)

@ EUROPEAN DYNAMICS | Brussels, Brussels, Belgium

Infrastructure Security Architect

@ Ørsted | Kuala Lumpur, MY

Contract Penetration Tester

@ Evolve Security | United States - Remote

Senior Penetration Tester

@ DigitalOcean | Canada