Saturday, August 9, 2025
No Result
View All Result
Crypeto News
Smarter_way_USA
  • Home
  • Bitcoin
  • Crypto Updates
    • General
    • Blockchain
    • Ethereum
    • Altcoin
    • Mining
    • Crypto Exchanges
  • NFT
  • DeFi
  • Web3
  • Metaverse
  • Analysis
  • Regulations
  • Scam Alert
  • Videos
CRYPTO MARKETCAP
  • Home
  • Bitcoin
  • Crypto Updates
    • General
    • Blockchain
    • Ethereum
    • Altcoin
    • Mining
    • Crypto Exchanges
  • NFT
  • DeFi
  • Web3
  • Metaverse
  • Analysis
  • Regulations
  • Scam Alert
  • Videos
CRYPTO MARKETCAP
Crypeto News
No Result
View All Result

Leveraging CISA Known Exploited Vulnerabilities: Why attack surface vulnerability validation is your strongest defense 

by crypetonews
December 8, 2023
in Blockchain
Reading Time: 5 mins read
0 0
A A
0
Home Blockchain
Share on FacebookShare on Twitter


With over 20,000 Common Vulnerabilities and Exposures (CVEs) being published each year1, the challenge of finding and fixing software with known vulnerabilities continues to stretch vulnerability management teams thin. These teams are given the impossible task of driving down risk by patching software across their organization, with the hope that their efforts will help to prevent a cybersecurity breach. Because it is impossible to patch all systems, most teams focus on remediating vulnerabilities that score highly in the Common Vulnerability Scoring System (CVSS)—a standardized and repeatable scoring system that ranks reported vulnerabilities from most to least critical.  

However, how do these organizations know that focusing on software with the highest scoring CVEs is the right approach? While it’s nice to be able to report to executives about the number or percentage of critical severity CVEs that have been patched, does that metric actually tell us anything about the improved resiliency of their organization? Does reducing the number of critical CVEs significantly reduce the risk of a breach? The answer is that, in theory, the organization is reducing the risk of a breach—but, in practice, it’s impossible to know for sure.  

CISA Known Exploited Vulnerabilities to strengthen cybersecurity resilience 

The Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEV) program was formed as a result of the desire to shift efforts away from focusing on theoretical risk and toward reducing breaches. CISA strongly advises that organizations should regularly review and monitor the Known Exploited Vulnerabilities catalog and prioritize remediation.2 By maintaining an updated list, CISA aims to provide an “authoritative source of vulnerabilities that have been exploited in the wild” and empower organizations to mitigate potential risks effectively in order to stay one step ahead in the battle against cyberattacks. 

CISA has managed to find needles in a haystack by narrowing the list of CVEs that security teams should focus on remediating, down from tens-of-thousands to just over 1,000 by focusing on vulnerabilities that:  

Have been assigned a CVE ID

Have been actively exploited in the wild

Have a clear remediation action, such as a vendor-provided update

This reduction in scope allows overwhelmed vulnerability management teams to deeply evaluate software running in their environment that has been reported to contain actively exploitable vulnerabilities because they are proven attack vectors—and therefore, the most likely sources of a breach.  

Shifting from traditional vulnerability management to risk prioritization 

With a smaller list of vulnerabilities from CISA KEV driving their workflows, it has been observed that security teams are spending less time on patching software (a laborious and low-value activity) and more time understanding their organization’s resiliency against these proven attack vectors. In fact, many vulnerability management teams have swapped patching for testing to determine if:  

These vulnerabilities from CISA KEV can be exploited in software in their environment.

The compensating controls they have put in place are effective at detecting and blocking breaches. This allows teams to understand the real risk facing their organization while simultaneously assessing if the investments they have made in security defense solutions are worthwhile. 

This shift toward testing the exploitability of vulnerabilities from the CISA KEV catalog is a sign that organizations are maturing from traditional vulnerability management programs into Continuous Threat Exposure Management (CTEM)—a term coined by Gartner—programs which “surface and actively prioritize whatever most threatens your business.” This focus on validated risk instead of theoretical risk means that teams are acquiring new skills and new solutions to help support the execution of exploits across their organization.   

The importance of ASM in gathering continuous vulnerability intelligence   

An attack surface management (ASM) solution provides a comprehensive view of an organization’s attack surface and helps you clarify your cyber risk with continuous asset discovery and risk prioritization. 

Continuous testing, a key pillar of CTEM, states that programs must “validate how attacks might work and how systems might react” with a goal of ensuring that security resources are focusing their time and energy on the threats that matter most. In fact, Gartner asserts that “organizations that prioritize based on a continuous threat exposure management program will be three times less likely to suffer a breach.”3 

Maturing our cybersecurity defense mindset to CTEM programs represents a significant improvement over traditional vulnerability management programs because it gets defenders tackling the issues that are most likely to lead to a breach. And stopping breaches should be the goal because the average cost of a breach keeps rising. The costs increased by 15% over the last three years to USD 4.45 million according to the Cost of a Data Breach report by IBM. So, as qualified resources continue to be hard to find and security budgets become tighter, consider giving your teams a narrower focus, such as vulnerabilities in the CISA KEV, and then arm them with tools to validate exploitability and assess the resiliency of your cybersecurity defenses. 

Verifying exploitable vulnerabilities with the IBM Security Randori 

IBM Security® Randori is an attack surface management solution that is designed to uncover your external exposures through the lens of an adversary. It performs continuous vulnerability validation across an organization’s external attack surface and reports on any vulnerabilities that can be exploited.

Figure 1. Randori’s risk-based priority algorithm helps prioritize top targets and shares adversarial insights you need to determine impact and risk 

In December 2019, Armellini Logistics was the target of a sophisticated ransomware attack. While the company quickly and successfully recovered from the attack, it was determined to adopt a more proactive approach to prevention moving forward. With Randori Recon, Armellini has been able to gain deeper visibility into external risk and ensure that the company’s asset and vulnerability management systems are updated as new cloud and SaaS applications come online. Increasingly, Armellini has been using Randori Recon’s target temptation analysis to triage and prioritize which vulnerabilities to patch. With this insight, the Armellini team has helped to reduce the company’s risk without impacting business operations. 

Figure 2: Randori helps confirm whether CVEs exist on your external attack surface and are exploitable 

The vulnerability validation feature goes beyond typical vulnerability management tools and programs by verifying the exploitability of a CVE, such as CVE-2023-7992, a zero-day vulnerability in Zyxel NAS devices that was discovered and reported by the IBM X-Force Applied Research team. This verification helps reduce noise and allows customers to act on real—not theoretical—risks and determine if mitigation or remediation efforts were successful by re-testing.  

Get started with IBM Security Randori 

You can get a free, 7-day trial of IBM Security Randori, or request a live demo to review your attack surface.

Learn more about IBM Security Randori Recon 

1 Published CVE Records.

2 Known Exploited Vulnerabilities Catalog.

3 Panetta, Kasey (2023, August 21), How to Manage Cybersecurity Threats, Not Episodes.

Director of Product Management – IBM Security Randori



Source link

Tags: attack..CISADefenseExploitedLeveragingStrongestSurfaceValidationVulnerabilitiesVulnerability
Previous Post

Bitcoin Price Remains Strong and Eyes Fresh Surge Above $44K

Next Post

Ethereum Price Soars To Over $2,300

Related Posts

Tezos (XTZ) Surges 8.89% as Bulls Target .10 Resistance Level
Blockchain

Tezos (XTZ) Surges 8.89% as Bulls Target $1.10 Resistance Level

August 9, 2025
CrediX Goes Silent After Exploit Deal, .5M Still Missing
Blockchain

CrediX Goes Silent After Exploit Deal, $4.5M Still Missing

August 8, 2025
Storm’s Defense Gets 0K Boost from Ethereum Foundation
Blockchain

Storm’s Defense Gets $500K Boost from Ethereum Foundation

August 8, 2025
Why Employers Trust Certified Professionals—Stats and Success Stories
Blockchain

Why Employers Trust Certified Professionals—Stats and Success Stories

August 8, 2025
WLD Price Rebounds 4.55% After Binance.US Listing Despite China Warning
Blockchain

WLD Price Rebounds 4.55% After Binance.US Listing Despite China Warning

August 8, 2025
SUI Price Surges 8.9% as Institutional Investment Offsets Token Unlock Impact
Blockchain

SUI Price Surges 8.9% as Institutional Investment Offsets Token Unlock Impact

August 8, 2025
Next Post
Ethereum Price Soars To Over ,300

Ethereum Price Soars To Over $2,300

FCA Raises Red Flag on Crypto Exchange LYKKE

FCA Raises Red Flag on Crypto Exchange LYKKE

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

RECOMMENDED

Chainlink launches real-time US equities data streams on 37 blockchains
Crypto Exchanges

Chainlink launches real-time US equities data streams on 37 blockchains

by crypetonews
August 4, 2025
0

Chainlink has introduced a new product called Data Streams, which delivers live pricing data for major US equities and exchange-traded...

Ripple Strikes 0M Deal With Rail to Dominate Global Stablecoin Payments

Ripple Strikes $200M Deal With Rail to Dominate Global Stablecoin Payments

August 8, 2025
IBIT Outflows Paired With Drop In Tron USDT Transfers

IBIT Outflows Paired With Drop In Tron USDT Transfers

August 4, 2025
Tezos (XTZ) Surges 8.89% as Bulls Target .10 Resistance Level

Tezos (XTZ) Surges 8.89% as Bulls Target $1.10 Resistance Level

August 9, 2025
New York gallery Kasmin will close this autumn as leadership launches new venture, Olney Gleason – The Art Newspaper

New York gallery Kasmin will close this autumn as leadership launches new venture, Olney Gleason – The Art Newspaper

August 6, 2025
WLD Price Rebounds 4.55% After Binance.US Listing Despite China Warning

WLD Price Rebounds 4.55% After Binance.US Listing Despite China Warning

August 8, 2025

Please enter CoinGecko Free Api Key to get this plugin works.
  • Trending
  • Comments
  • Latest
Top 10 NFTs to Watch in 2025 for High-Return Investments

Top 10 NFTs to Watch in 2025 for High-Return Investments

November 22, 2024
Uniswap v4 Teases Major Updates for 2025

Uniswap v4 Teases Major Updates for 2025

January 2, 2025
Enforceable Human-Readable Transactions: Can They Prevent Bybit-Style Hacks?

Enforceable Human-Readable Transactions: Can They Prevent Bybit-Style Hacks?

February 27, 2025
Best Cryptocurrency Portfolio Tracker Apps to Use in 2025

Best Cryptocurrency Portfolio Tracker Apps to Use in 2025

April 24, 2025
What’s the Difference Between Polygon PoS vs Polygon zkEVM?

What’s the Difference Between Polygon PoS vs Polygon zkEVM?

November 20, 2023
FTT jumps 7% as Backpack launches platform to help FTX victims liquidate claims

FTT jumps 7% as Backpack launches platform to help FTX victims liquidate claims

July 18, 2025
XRP Official CRYPTO VOTE LIVE NEWS!🔴GENIUS, CLARITY Act

XRP Official CRYPTO VOTE LIVE NEWS!🔴GENIUS, CLARITY Act

46
IMP UPDATE : BILLS PASSED || BITCOIN DOMINANCE FALLING

IMP UPDATE : BILLS PASSED || BITCOIN DOMINANCE FALLING

38
🚨BIG UPDATE ON WAZIRX || ALT COIN PORTFOLIO NO 1

🚨BIG UPDATE ON WAZIRX || ALT COIN PORTFOLIO NO 1

37
BITCOIN: IT'S HAPPENING NOW (Urgent Update)!!! Bitcoin News Today, Ethereum, Solana, XRP & Chainlink

BITCOIN: IT'S HAPPENING NOW (Urgent Update)!!! Bitcoin News Today, Ethereum, Solana, XRP & Chainlink

33
JUST IN XRP RIPPLE DUBAI NEWS!

JUST IN XRP RIPPLE DUBAI NEWS!

25
Flash USDT | How It Became the Biggest Crypto Scam Worldwide

Flash USDT | How It Became the Biggest Crypto Scam Worldwide

31
Will ADA Reach  or ?

Will ADA Reach $10 or $50?

August 9, 2025
James Howell’s Lost Bitcoin Wallet Now Worth About 0 Million

James Howell’s Lost Bitcoin Wallet Now Worth About $950 Million

August 9, 2025
Bitcoin Is Still King Of Capital Inflows, According To Michael Saylor

Bitcoin Is Still King Of Capital Inflows, According To Michael Saylor

August 9, 2025
World Liberty Financial Pitches .5 Billion Crypto Treasury Company: Report

World Liberty Financial Pitches $1.5 Billion Crypto Treasury Company: Report

August 9, 2025
Ethereum Price Watch: Market Eyes Breakout Toward ,500 Target

Ethereum Price Watch: Market Eyes Breakout Toward $4,500 Target

August 9, 2025
Even Robinson Crusoe Understood The Price And Value Of Money

Even Robinson Crusoe Understood The Price And Value Of Money

August 9, 2025
Crypeto News

Find the latest Bitcoin, Ethereum, blockchain, crypto, Business, Fintech News, interviews, and price analysis at Crypeto News.

CATEGORIES

  • Altcoin
  • Analysis
  • Bitcoin
  • Blockchain
  • Crypto Exchanges
  • Crypto Updates
  • DeFi
  • Ethereum
  • Metaverse
  • Mining
  • NFT
  • Regulations
  • Scam Alert
  • Uncategorized
  • Videos
  • Web3

LATEST UPDATES

  • Will ADA Reach $10 or $50?
  • James Howell’s Lost Bitcoin Wallet Now Worth About $950 Million
  • Bitcoin Is Still King Of Capital Inflows, According To Michael Saylor
  • Disclaimer
  • Privacy Policy
  • DMCA
  • Cookie Privacy Policy
  • Terms and Conditions
  • Contact us

Copyright © 2022 Crypeto News.
Crypeto News is not responsible for the content of external sites.

No Result
View All Result
  • Home
  • Bitcoin
  • Crypto Updates
    • General
    • Blockchain
    • Ethereum
    • Altcoin
    • Mining
    • Crypto Exchanges
  • NFT
  • DeFi
  • Web3
  • Metaverse
  • Analysis
  • Regulations
  • Scam Alert
  • Videos

Copyright © 2022 Crypeto News.
Crypeto News is not responsible for the content of external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In