InfosecTrainCommon Weakness Enumeration: Why is it Important?What is Common Weakness Enumeration (CWE)?Oct 13, 2023
Overkill SecurityCVE-2024–0204 in Fortra’s GoAnywhere MFT — Overkill SecurityUnpacking with more detail: PDF, mirror PDFMay 8May 8
Edwin CovertUnderstanding the Relationship between CWE and CAPEC Through Two ScenariosOrganizations must protect the confidentiality, integrity, and availability of their information and data. Confidentiality protects the…Dec 6, 2021Dec 6, 2021
AbdallahhendyUnraveling the Secrets of CWE and CVE in easily wayIn the digital age that swallow us, cybersecurity is more critical than ever. So, the awareness of the weakness in our software and…Apr 21Apr 21
InfosecTrainCommon Weakness Enumeration: Why is it Important?What is Common Weakness Enumeration (CWE)?Oct 13, 2023
Overkill SecurityCVE-2024–0204 in Fortra’s GoAnywhere MFT — Overkill SecurityUnpacking with more detail: PDF, mirror PDFMay 8
Edwin CovertUnderstanding the Relationship between CWE and CAPEC Through Two ScenariosOrganizations must protect the confidentiality, integrity, and availability of their information and data. Confidentiality protects the…Dec 6, 2021
AbdallahhendyUnraveling the Secrets of CWE and CVE in easily wayIn the digital age that swallow us, cybersecurity is more critical than ever. So, the awareness of the weakness in our software and…Apr 21
Rakib AhmedWhat is CVE, CWE and NVDCVE (Common Vulnerabilities and Exposures): CVE stands for Common Vulnerabilities and Exposures. It is a standardized system for…Oct 9, 2023
Ajith ChandranNavigating Cybersecurity: A Guide to CVE, CWE, and NVDIn the ever-evolving realm of cybersecurity, understanding the key components of vulnerability management is paramount. This guide takes…Oct 9, 2023
Katie HorneinShiftLeft BlogCWE-22: Path Traversal VulnerabilitiesImproper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)Sep 9, 2021