MazleyouCVE and NVD: Pillars of CybersecurityHello everyone! Today, we’re diving deep into two crucial elements of the cybersecurity world: CVE (Common Vulnerabilities and Exposures)…Oct 20
InTheSecMasterbyArunklWhat is a Vulnerability?Whether you know it or not, your computer and the network it connects to likely has security vulnerabilities. But what exactly is a…Feb 161
MazleyouCVE and NVD: Pillars of Cybersecurity InformationCVE and NVD: Pillars of Cybersecurity InformationSep 27Sep 27
TTLNewsOWASP DependencyCheck returns HTTP 403 Forbidden accessing NVD API using API keyUsing the Gradle DependencyCheck plugin, you might get HTTP 403 Forbidden errors accessing the NVD API with API keyDec 26, 2023Dec 26, 2023
InCI/CD/DevOpsbyShimining GitHub Advanced Security data using MongoDBThis was inspired by the work published by Dakota Riley at https://blog.aquia.us/blog/2024-02-27-gh-advisory-db/Sep 13Sep 13
MazleyouCVE and NVD: Pillars of CybersecurityHello everyone! Today, we’re diving deep into two crucial elements of the cybersecurity world: CVE (Common Vulnerabilities and Exposures)…Oct 20
InTheSecMasterbyArunklWhat is a Vulnerability?Whether you know it or not, your computer and the network it connects to likely has security vulnerabilities. But what exactly is a…Feb 161
MazleyouCVE and NVD: Pillars of Cybersecurity InformationCVE and NVD: Pillars of Cybersecurity InformationSep 27
TTLNewsOWASP DependencyCheck returns HTTP 403 Forbidden accessing NVD API using API keyUsing the Gradle DependencyCheck plugin, you might get HTTP 403 Forbidden errors accessing the NVD API with API keyDec 26, 2023
InCI/CD/DevOpsbyShimining GitHub Advanced Security data using MongoDBThis was inspired by the work published by Dakota Riley at https://blog.aquia.us/blog/2024-02-27-gh-advisory-db/Sep 13
Vishal GargIs NVD Dead? RIP NVD!The Inception and Evolution of NVD, Current Challenges, Future of NVD, and the Way Forward for the Cybersecurity Industry!Mar 30
InNerd For TechbyTaylor ArmerdingNational Vulnerability Database delays cause major blind spot for software makers and usersThe National Vulnerability Database is way behind in its analyses of software vulnerabiities. NIST says it’s due to underfunding.Apr 15
Larbi OUIYZMEDemystifying Cybersecurity Terms: What Are CVE, CWE, and NVD?Cybersecurity can seem like a maze of complex words and acronyms, but don’t worry; we’re here to make it simpler. Let’s take a closer look…Oct 9, 2023