MazleyouCVE and NVD: Pillars of CybersecurityHello everyone! Today, we’re diving deep into two crucial elements of the cybersecurity world: CVE (Common Vulnerabilities and Exposures)…Oct 20
Taylor ArmerdinginNerd For TechNational Vulnerability Database delays cause major blind spot for software makers and usersThe National Vulnerability Database is way behind in its analyses of software vulnerabiities. NIST says it’s due to underfunding.Apr 15
MazleyouCVE and NVD: Pillars of Cybersecurity InformationCVE and NVD: Pillars of Cybersecurity InformationSep 27Sep 27
TTLNewsOWASP DependencyCheck returns HTTP 403 Forbidden accessing NVD API using API keyUsing the Gradle DependencyCheck plugin, you might get HTTP 403 Forbidden errors accessing the NVD API with API keyDec 26, 2023Dec 26, 2023
ShiinCI/CD/DevOpsmining GitHub Advanced Security data using MongoDBThis was inspired by the work published by Dakota Riley at https://blog.aquia.us/blog/2024-02-27-gh-advisory-db/Sep 13Sep 13
MazleyouCVE and NVD: Pillars of CybersecurityHello everyone! Today, we’re diving deep into two crucial elements of the cybersecurity world: CVE (Common Vulnerabilities and Exposures)…Oct 20
Taylor ArmerdinginNerd For TechNational Vulnerability Database delays cause major blind spot for software makers and usersThe National Vulnerability Database is way behind in its analyses of software vulnerabiities. NIST says it’s due to underfunding.Apr 15
MazleyouCVE and NVD: Pillars of Cybersecurity InformationCVE and NVD: Pillars of Cybersecurity InformationSep 27
TTLNewsOWASP DependencyCheck returns HTTP 403 Forbidden accessing NVD API using API keyUsing the Gradle DependencyCheck plugin, you might get HTTP 403 Forbidden errors accessing the NVD API with API keyDec 26, 2023
ShiinCI/CD/DevOpsmining GitHub Advanced Security data using MongoDBThis was inspired by the work published by Dakota Riley at https://blog.aquia.us/blog/2024-02-27-gh-advisory-db/Sep 13
Vishal GargIs NVD Dead? RIP NVD!The Inception and Evolution of NVD, Current Challenges, Future of NVD, and the Way Forward for the Cybersecurity Industry!Mar 30
Miguel Lopez LuisPenetration Testing and Incident Response — Module 5 Lab: Vulnerability ScanningIn this lab for CYBR430, we delve into vulnerability scanning using Greenbone Vulnerability Manager (GVM). The lab is divided into two…Aug 11
Nguessie FabiolaCVE, CWE and NVD⚠️ Do you know what CVE, CWE, and NVD mean? It’s crucial to understand these terms to stay safe online! Let’s dive in and learn more…Oct 8, 2023