CVEFeed.io Blog

CVEFeed.io Blog

  • Pricing
  • Go to CVEFeed.io

cve

  • Software Supply Chain Vulnerabilities and How to Address Them

    Posted by

    Kateryna Liu

    on

    March 26, 2026

    Software Supply Chain Vulnerabilities and How to Address Them

    Author: Sean Whitmore, GWEB, CSSLP — Application Security Engineer. 11 years of experience in secure software development lifecycle implementation, code review, and vulnerability management for web and mobile applications. Works with development…

  • Penetration Testing and Vulnerability Scanning

    Posted by

    Kateryna Liu

    on

    March 23, 2026

    Penetration Testing and Vulnerability Scanning

    Author: Marcus Hale, OSCP, CEH — Offensive Security Specialist. Penetration tester with 11 years of hands-on experience across network, web application, and social engineering assessments.  Consultant: Marcus Dreiling, OSCP, CEH — certified penetration tester…

  • What Is Vulnerability Prioritization

    Posted by

    Kateryna Liu

    on

    March 18, 2026

    What Is Vulnerability Prioritization

    Author: Sean Whitmore, GWEB, CSSLP — Application Security Engineer. 11 years of experience in secure software development lifecycle implementation, code review, and vulnerability management for web and mobile applications. Works with development…

  • Product Update • v2.2 | CVEQL, Jira Integration, and a Complete Visual Overhaul

    Posted by

    cvefeed

    on

    March 17, 2026

    Product Update • v2.2 | CVEQL, Jira Integration, and a Complete Visual Overhaul

    178 commits, 14 feature areas, and a whole new way to search vulnerabilities. Here’s everything new in CVEFeed.io. It’s been three weeks since our v2.1 release, and we haven’t been sitting around.…

  • What is the Exploit Prediction Scoring System

    Posted by

    Kateryna Liu

    on

    March 16, 2026

    What is the Exploit Prediction Scoring System

    Author: Nora Belfield, GCTI — Senior Threat Intelligence Analyst, 9 years of experience tracking advanced persistent threat groups and translating raw intelligence into actionable risk context for security operations teams.  Consultant: Sandra Okafor, CISSP…

  • What Is Unified Threat Management

    Posted by

    Kateryna Liu

    on

    March 12, 2026

    What Is Unified Threat Management

    Author: Dana Marlowe — technology writer and editor with over ten years of experience covering cybersecurity, privacy, and enterprise IT. Has contributed to security-focused publications and worked directly with IT and compliance…

  • Securing Operational Technology, ICS, and SCADA Systems

    Posted by

    Kateryna Liu

    on

    March 9, 2026

    Securing Operational Technology, ICS, and SCADA Systems

    Author: Victor Strang, GICSP — Industrial Cybersecurity Engineer. 15 years of experience in operational technology security across energy, utilities, and manufacturing. Specializes in ICS/SCADA risk assessments, network segmentation for industrial environments, and…

  • What Is a Vulnerability Assessment

    Posted by

    Kateryna Liu

    on

    March 8, 2026

    What Is a Vulnerability Assessment

    Author: James Calloway, CISSP, CISM — Senior Cybersecurity Risk Advisor. More than 14 years of experience helping organizations translate cyber threats into financial decision frameworks. Specializes in risk quantification, cyber insurance modeling, and…

  • What Is Cyber Risk Quantification

    Posted by

    Kateryna Liu

    on

    March 4, 2026

    What Is Cyber Risk Quantification

    Author: James Calloway, CISSP, CISM — Senior Cybersecurity Risk Advisor with over 14 years of experience helping organizations translate technical threats into financial decision frameworks. Organizations that invest in cybersecurity without measuring…

  • Attack Vectors and Attack Surfaces in Cybersecurity

    Posted by

    Kateryna Liu

    on

    February 26, 2026

    Attack Vectors and Attack Surfaces in Cybersecurity

    Author: Alex Mercer – Principal Security Architect specializing in cloud infrastructure defense and enterprise cyber risk mitigation. TL;DR: Business and security teams often confuse attack vectors (the how) with attack surfaces (the where). Knowing the difference…

1 2 3 4
→
  • Pricing
  • Go to CVEFeed.io