<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <id>https://www.vulncheck.com/blog</id>
    <title>VulnCheck Blog</title>
    <updated>2026-04-16T22:57:27.909Z</updated>
    <generator>https://github.com/jpmonette/feed</generator>
    <link rel="alternate" href="https://www.vulncheck.com/blog"/>
    <link rel="self" href="https://www.vulncheck.com/feed/blog/atom.xml"/>
    <subtitle>Blog posts we have recently written or historic blog posts we have written in the past.</subtitle>
    <logo>https://www.vulncheck.com/__og-image__/image/blog/og.png</logo>
    <rights>Copyright (c) 2026 VulnCheck, Inc.</rights>
    <entry>
        <title type="html"><![CDATA[Tracking CVEs Attributed to Anthropic Researchers and Project Glasswing]]></title>
        <id>/blog/anthropic-glasswing-cves</id>
        <link href="https://www.vulncheck.com/blog/anthropic-glasswing-cves"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/anthropic-glasswing-cves/og.png" type="image/png"/>
        <updated>2026-04-15T15:00:00.000Z</updated>
        <summary type="html"><![CDATA[A primary source breakdown of every CVE publicly credited to Anthropic researchers and Project Glasswing, based on a full search of the CVE record database.]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2026-04-15T15:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[CVE-2026-20079 - Cisco FMC Authentication Bypass RCE Analysis]]></title>
        <id>/blog/cisco-fmc-auth-bypass-cve-2026-20079</id>
        <link href="https://www.vulncheck.com/blog/cisco-fmc-auth-bypass-cve-2026-20079"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/cisco-fmc-auth-bypass-cve-2026-20079/og.png" type="image/png"/>
        <updated>2026-03-26T22:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck's Initial Access Intelligence team analysis of CVE-2026-20079, an authentication bypass and remote code execution vulnerability in Cisco Secure Firewall Management Center.]]></summary>
        <author>
            <name>Cale Black</name>
            <uri>https://hosakacorp.net</uri>
        </author>
        <published>2026-03-26T22:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[The Return of the Kinsing]]></title>
        <id>/blog/return-of-the-kinsing</id>
        <link href="https://www.vulncheck.com/blog/return-of-the-kinsing"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/return-of-the-kinsing/og.png" type="image/png"/>
        <updated>2026-03-26T14:00:00.000Z</updated>
        <summary type="html"><![CDATA[Canary Intelligence linked exploitation of CVE-2023-46604, CVE-2023-38646, and CVE-2025-55182 to the same Kinsing infrastructure, including a shared staging host and attacker IP first seen in the canary network on March 12, 2026. The research shows how an older malware family is still adapting by adding new exploit paths while continuing to rely on established infrastructure.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2026-03-26T14:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[2026 State of Exploitation: Exploiting The Network Edge]]></title>
        <id>/blog/network-edge-device-report-2026</id>
        <link href="https://www.vulncheck.com/blog/network-edge-device-report-2026"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/network-edge-device-report-2026/og.png" type="image/png"/>
        <updated>2026-03-23T14:00:00.000Z</updated>
        <summary type="html"><![CDATA[What’s really being targeted at the network edge? VulnCheck’s 2026 research shows that a significant portion of exploited vulnerabilities affect end-of-life devices, with consumer networking equipment and botnets driving much of the activity. This report breaks down the trends shaping real-world exploitation.]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2026-03-23T14:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[n8n Should Have More Than One CISA KEV Entry]]></title>
        <id>/blog/n8n-needs-more-kev</id>
        <link href="https://www.vulncheck.com/blog/n8n-needs-more-kev"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/n8n-needs-more-kev/og.png" type="image/png"/>
        <updated>2026-03-20T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[CISA recently added CVE-2025-68613, an authenticated n8n RCE, to its KEV catalog, but that framing misses how the vulnerability is actually exploited. In practice, it can be paired with CVE-2026-21858, an authentication bypass that is already being actively exploited in the wild. With over 14,000 exposed n8n instances, this attack path is both practical and widespread. The bypass enabling these chains likely warrants its own KEV entry.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2026-03-20T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Herding Cats: Recent Cisco SD-WAN Manager Vulnerabilities]]></title>
        <id>/blog/cisco-sd-wan-manager-vulns</id>
        <link href="https://www.vulncheck.com/blog/cisco-sd-wan-manager-vulns"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/cisco-sd-wan-manager-vulns/og.png" type="image/png"/>
        <updated>2026-03-12T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck’s Initial Access Intelligence team has been tracking and analyzing half a dozen recent vulnerabilities in Cisco Catalyst SD-WAN Manager, several of which have begun to see in-the-wild exploitation. Industry focus has been on CVE-2026-20127, but several other vulnerabilities also pose significant risk.]]></summary>
        <author>
            <name>Josh Shomo</name>
            <uri>https://www.linkedin.com/in/josh-shomo-5260bb259/</uri>
        </author>
        <author>
            <name>Caitlin Condon</name>
            <uri>https://www.linkedin.com/in/ccondon/</uri>
        </author>
        <published>2026-03-12T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[SiftRanking Canary Intelligence]]></title>
        <id>/blog/siftrank_canaries</id>
        <link href="https://www.vulncheck.com/blog/siftrank_canaries"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/siftrank_canaries/og.png" type="image/png"/>
        <updated>2026-03-02T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Canary Intelligence captures thousands of real-world exploitation attempts every day, but scale alone does not create insight. This post walks through how clustering, structured feature extraction, and SiftRank transform raw exploitation telemetry into AI-driven prioritization. The result is a repeatable workflow that surfaces high-leverage attacker activity in minutes.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2026-03-02T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Introducing the 2026 VulnCheck Exploit Intelligence Report]]></title>
        <id>/blog/2026-vulncheck-exploit-intelligence-report</id>
        <link href="https://www.vulncheck.com/blog/2026-vulncheck-exploit-intelligence-report"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/2026-vulncheck-exploit-intelligence-report/og.png" type="image/png"/>
        <updated>2026-02-25T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[In-depth analysis of 2025 CVEs and exploit trends from VulnCheck’s research team. The 2026 Exploit Intelligence Report includes an evaluation of the public exploit ecosystem, ransomware and state-sponsored threat actor deep dives, and a data-driven list of 2025’s routinely targeted vulnerabilities.]]></summary>
        <author>
            <name>Caitlin Condon</name>
            <uri>https://www.linkedin.com/in/ccondon/</uri>
        </author>
        <published>2026-02-25T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[What 28 Days of Faster Vulnerability Intelligence Is Worth]]></title>
        <id>/blog/economic-value-lead-time</id>
        <link href="https://www.vulncheck.com/blog/economic-value-lead-time"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/economic-value-lead-time/og.png" type="image/png"/>
        <updated>2026-02-11T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Using IBM's 2025 Cost of a Data Breach data, VulnCheck's 28-day speed advantage translates to $518,000 in risk avoided per incident.]]></summary>
        <author>
            <name>Tanner Embry</name>
            <uri>https://www.linkedin.com/in/tannerembry/</uri>
        </author>
        <published>2026-02-11T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Making Serialization Gadgets by Hand - Java]]></title>
        <id>/blog/making-java-gadgets</id>
        <link href="https://www.vulncheck.com/blog/making-java-gadgets"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/making-java-gadgets/og.png" type="image/png"/>
        <updated>2026-02-05T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Learn how to start creating Java serialization gadgets yourself - or use VulnCheck's go-exploit library for Golang-based exploits!]]></summary>
        <author>
            <name>Jonathan Peterson</name>
            <uri>https://infosec.exchange/@lobsterjerusalem</uri>
        </author>
        <published>2026-02-05T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Metro4Shell: Exploitation of React Native’s Metro Server in the Wild]]></title>
        <id>/blog/metro4shell_eitw</id>
        <link href="https://www.vulncheck.com/blog/metro4shell_eitw"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/metro4shell_eitw/og.png" type="image/png"/>
        <updated>2026-02-03T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck observed in-the-wild exploitation of CVE-2025-11953 targeting exposed React Native Metro servers shortly after public disclosure. Analysis of repeated attacks shows consistent, operational payload delivery rather than opportunistic scanning. This post examines how the vulnerability was exploited and why early exploitation visibility matters for defenders.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2026-02-03T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Street Smarts: SmarterMail ConnectToHub Unauthenticated RCE (CVE-2026-24423)]]></title>
        <id>/blog/smartermail-connecttohub-rce-cve-2026-24423</id>
        <link href="https://www.vulncheck.com/blog/smartermail-connecttohub-rce-cve-2026-24423"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/smartermail-connecttohub-rce-cve-2026-24423/og.png" type="image/png"/>
        <updated>2026-01-26T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Exploring an unauthenticated remote code execution in the SmarterTools SmarterMail server via the ConnectToHub mounting functionality.]]></summary>
        <author>
            <name>Cale Black</name>
            <uri>https://hosakacorp.net</uri>
        </author>
        <published>2026-01-26T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[VulnCheck State of Exploitation 2026]]></title>
        <id>/blog/state-of-exploitation-2026</id>
        <link href="https://www.vulncheck.com/blog/state-of-exploitation-2026"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/state-of-exploitation-2026/og.png" type="image/png"/>
        <updated>2026-01-21T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Key Trends and Findings from 2025’s Known Exploited Vulnerabilities]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2026-01-21T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[How to Report a Security Vulnerability to VulnCheck]]></title>
        <id>/blog/report-a-vulnerability</id>
        <link href="https://www.vulncheck.com/blog/report-a-vulnerability"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/report-a-vulnerability/og.png" type="image/png"/>
        <updated>2026-01-09T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck offers a free vulnerability reporting service designed to reduce the burden of disclosure and support researchers.]]></summary>
        <author>
            <name>Wade Sparks</name>
            <uri>https://www.linkedin.com/in/wadesparksvt/</uri>
        </author>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2026-01-09T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[FortiCloud SSO Login Bypass Vulnerabilities Exploited in the Wild]]></title>
        <id>/blog/forticloud-sso-login-bypass</id>
        <link href="https://www.vulncheck.com/blog/forticloud-sso-login-bypass"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/forticloud-sso-login-bypass/og.png" type="image/png"/>
        <updated>2025-12-18T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Fortinet disclosed two critical vulnerabilities on December 9 that arise from improper cryptographic signature verification and enable remote attackers to bypass SSO login on vulnerable devices. The vulnerabilities are being exploited in the wild.]]></summary>
        <author>
            <name>Caitlin Condon</name>
            <uri>https://www.linkedin.com/in/ccondon/</uri>
        </author>
        <published>2025-12-18T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Tales from the Exploit Mines: Gladinet Triofox CVE-2025-12480 RCE]]></title>
        <id>/blog/triofox-exploit-cve-2025-12480</id>
        <link href="https://www.vulncheck.com/blog/triofox-exploit-cve-2025-12480"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/triofox-exploit-cve-2025-12480/og.png" type="image/png"/>
        <updated>2025-12-18T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Triofox CVE-2025-12480 exploitation from beginning to end, all sharp edges included.]]></summary>
        <author>
            <name>Cale Black</name>
            <uri>https://hosakacorp.net</uri>
        </author>
        <published>2025-12-18T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[What's Next: React2Shell Beyond Next.js]]></title>
        <id>/blog/react2shell-beyond-nextjs</id>
        <link href="https://www.vulncheck.com/blog/react2shell-beyond-nextjs"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/react2shell-beyond-nextjs/og.png" type="image/png"/>
        <updated>2025-12-16T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck's Initial Access Intelligence team analyzes React2Shell CVE-2025-55182 exploitability in  frameworks that utilize the vulnerable components outside of Next.js alone, with emphasis on exploitation steps and potential fingerprinting paths.]]></summary>
        <author>
            <name>Jonathan Peterson</name>
            <uri>https://infosec.exchange/@lobsterjerusalem</uri>
        </author>
        <author>
            <name>Cale Black</name>
            <uri>https://hosakacorp.net</uri>
        </author>
        <published>2025-12-16T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Critical CVEs, CVSS v4, and the Adoption Gap No One Talks About]]></title>
        <id>/blog/cvss-severity</id>
        <link href="https://www.vulncheck.com/blog/cvss-severity"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/cvss-severity/og.png" type="image/png"/>
        <updated>2025-12-15T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[A common topic that’s been brought to my attention on several occasions is the perceived increase in vulnerabilities deemed “Critical” by their CVSS severity. According to FIRST, CVSS severity ratings are intended to help organizations assess and prioritize vulnerability management efforts. With this in mind, I set out to explore CVSS severity trends over time, which ultimately led me to examine the impact and adoption of CVSS v4.]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2025-12-15T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[React2Shell Exploits on GitHub]]></title>
        <id>/blog/react2shell-github</id>
        <link href="https://www.vulncheck.com/blog/react2shell-github"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/react2shell-github/og.png" type="image/png"/>
        <updated>2025-12-12T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck reviewed the full wave of React2Shell exploits published on GitHub, discarding about half as broken or misleading and surfacing several genuinely interesting techniques from the rest. We curated the usable set, highlighted the notable variants, and made the entire approved dataset freely available in VulnCheck's Exploit Database (XDB).]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2025-12-12T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[React2Shell and What Our Canaries See]]></title>
        <id>/blog/react2shell-canaries</id>
        <link href="https://www.vulncheck.com/blog/react2shell-canaries"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/react2shell-canaries/og.png" type="image/png"/>
        <updated>2025-12-09T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[We're already seeing active React2Shell exploitation, and defenders need to know what it looks like. VulnCheck Canary Intelligence has captured real attacker probes and payloads, offering early insight into how operators are weaponizing the vulnerability. The post includes detailed examples and a list of observed IPs to support immediate defensive action.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2025-12-09T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Reacting to Shells: React2Shell Variants & the CVE-2025-55182 Exploit Ecosystem]]></title>
        <id>/blog/reacting-to-shells-react2shell-variants-ecosystem</id>
        <link href="https://www.vulncheck.com/blog/reacting-to-shells-react2shell-variants-ecosystem"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/reacting-to-shells-react2shell-variants-ecosystem/og.png" type="image/png"/>
        <updated>2025-12-08T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[An analysis of React2Shell variants, public exploits, paths to RCE, and implications for detection and response]]></summary>
        <author>
            <name>Cale Black</name>
            <uri>https://hosakacorp.net</uri>
        </author>
        <published>2025-12-08T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Frost Checks First: Selective Exploitation]]></title>
        <id>/blog/frost-checks-first</id>
        <link href="https://www.vulncheck.com/blog/frost-checks-first"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/frost-checks-first/og.png" type="image/png"/>
        <updated>2025-12-04T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[New CVE-2025-2611 attacks led us to a selective exploitation tool named frost that only fires when targets match precise fingerprints. VulnCheck's Canary Intelligence, EVI, and IP Intel exposed the CVEs involved, the operator's infrastructure, and the internet-exposed systems they can reach.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2025-12-04T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Critical vulnerability in React and Next.js (CVE-2025-55182)]]></title>
        <id>/blog/cve-2025-55182-react-nextjs</id>
        <link href="https://www.vulncheck.com/blog/cve-2025-55182-react-nextjs"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/cve-2025-55182-react-nextjs/og.png" type="image/png"/>
        <updated>2025-12-03T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[On December 3, 2025, React developers disclosed CVE-2025-55182 (React2Shell), an unauthenticated remote code execution vulnerability with a CVSS score of 10 that affects React Server Components and Next.js. This blog post provides an overview of the vulnerability, RCE path, research analysis, and recommended actions.]]></summary>
        <author>
            <name>Caitlin Condon</name>
            <uri>https://www.linkedin.com/in/ccondon/</uri>
        </author>
        <published>2025-12-03T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Helping Improve and Scale the CVE Ecosystem Through the Lens of Security Research]]></title>
        <id>/blog/helping-scale-cve</id>
        <link href="https://www.vulncheck.com/blog/helping-scale-cve"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/helping-scale-cve/og.png" type="image/png"/>
        <updated>2025-12-02T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck is committed to accelerating visibility and improving data quality for defenders. We support the CVE Program and continue to expand our contributions by assigning CVE IDs to vulnerabilities observed by, discovered by, or reported to VulnCheck.]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2025-12-02T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[The Mystery OAST Host Behind a Regionally Focused Exploit Operation]]></title>
        <id>/blog/mystery-oast</id>
        <link href="https://www.vulncheck.com/blog/mystery-oast"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/mystery-oast/og.png" type="image/png"/>
        <updated>2025-11-27T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck Canary Intelligence uncovered a long-running attacker-owned OAST service operating from Google Cloud. The actor blended stock Nuclei templates with custom payloads while focusing their activity on canaries deployed in a single region. This unusual combination reveals a structured, sustained scanning operation rather than ordinary opportunistic spraying.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2025-11-27T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Introducing VulnCheck Canary Intelligence]]></title>
        <id>/blog/introducing-vulncheck-canary-intelligence</id>
        <link href="https://www.vulncheck.com/blog/introducing-vulncheck-canary-intelligence"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/introducing-vulncheck-canary-intelligence/og.png" type="image/png"/>
        <updated>2025-11-17T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Introducing VulnCheck Canary Intelligence, a new offering that captures real-world exploitation as it happens.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2025-11-17T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Fortinet FortiWeb Exploitation Hits Silently Patched Vulnerability]]></title>
        <id>/blog/fortinet-forti-web-exploitation-hits-silently-patched-vulnerability</id>
        <link href="https://www.vulncheck.com/blog/fortinet-forti-web-exploitation-hits-silently-patched-vulnerability"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/fortinet-forti-web-exploitation-hits-silently-patched-vulnerability/og.png" type="image/png"/>
        <updated>2025-11-14T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[A silently patched vulnerability (CVE-2025-64446) in Fortinet FortiWeb is being exploited in the wild to add administrative users and compromise target devices]]></summary>
        <author>
            <name>Caitlin Condon</name>
            <uri>https://www.linkedin.com/in/ccondon/</uri>
        </author>
        <published>2025-11-14T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[XWiki Under Increased Attack]]></title>
        <id>/blog/xwiki-under-increased-attack</id>
        <link href="https://www.vulncheck.com/blog/xwiki-under-increased-attack"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/xwiki-under-increased-attack/og.png" type="image/png"/>
        <updated>2025-11-14T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[What began as one attacker exploiting CVE-2025-24893 has become a multi-actor scramble including botnets, miners, and custom tooling. Our early Canary detections show how quickly real-world exploitation now evolves.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2025-11-14T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Making Serialization Gadgets by Hand - .NET]]></title>
        <id>/blog/making-dotnet-gadgets</id>
        <link href="https://www.vulncheck.com/blog/making-dotnet-gadgets"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/making-dotnet-gadgets/og.png" type="image/png"/>
        <updated>2025-11-12T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Creating a language-native .NET source for deserialization gadgets]]></summary>
        <author>
            <name>Jonathan Peterson</name>
            <uri>https://infosec.exchange/@lobsterjerusalem</uri>
        </author>
        <published>2025-11-12T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[VulnCheck Research Highlights: November 2025]]></title>
        <id>/blog/november-2025-research-highlights</id>
        <link href="https://www.vulncheck.com/blog/november-2025-research-highlights"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/november-2025-research-highlights/og.png" type="image/png"/>
        <updated>2025-11-05T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Insights on emerging threats, VulnCheck-observed exploitation in the wild, and published CVEs from VulnCheck’s research teams]]></summary>
        <author>
            <name>Caitlin Condon</name>
            <uri>https://www.linkedin.com/in/ccondon/</uri>
        </author>
        <published>2025-11-05T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[XWiki CVE-2025-24893 Exploited in the Wild]]></title>
        <id>/blog/xwiki-cve-2025-24893-eitw</id>
        <link href="https://www.vulncheck.com/blog/xwiki-cve-2025-24893-eitw"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/xwiki-cve-2025-24893-eitw/og.png" type="image/png"/>
        <updated>2025-10-28T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck Canaries captured live exploitation of XWiki CVE-2025-24893, a vulnerability absent from CISA KEV but actively abused in the wild.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2025-10-28T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Accelerating Our Footprint and Innovation: Why VulnCheck Posted a Record-Setting Q3]]></title>
        <id>/blog/q3-2025-momentum</id>
        <link href="https://www.vulncheck.com/blog/q3-2025-momentum"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/q3-2025-momentum/og.png" type="image/png"/>
        <updated>2025-10-16T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[This quarter was a defining one for VulnCheck — not just in numbers, but in what those numbers represent and how critical VulnCheck is in both enriching cyber products in the market and protecting our global economy and national security.]]></summary>
        <author>
            <name>Tom Bain</name>
            <uri>https://x.com/tmbainjr1</uri>
        </author>
        <published>2025-10-16T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[ICTBroadcast Command Injection Actively Exploited (CVE-2025-2611)]]></title>
        <id>/blog/ictbroadcast-kev</id>
        <link href="https://www.vulncheck.com/blog/ictbroadcast-kev"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/ictbroadcast-kev/og.png" type="image/png"/>
        <updated>2025-10-14T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Attackers are abusing an unauthenticated command injection bug in ICTBroadcast (CVE-2025-2611) to execute remote commands and drop reverse shells. VulnCheck caught the exploitation, linked it to related research, and had detections available for customers well before the activity began.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2025-10-14T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[VulnCheck Research Highlights: October 2025]]></title>
        <id>/blog/october-2025-research-highlights</id>
        <link href="https://www.vulncheck.com/blog/october-2025-research-highlights"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/october-2025-research-highlights/og.png" type="image/png"/>
        <updated>2025-10-09T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Insights on recent emerging threats, initial access vulnerabilities, and published CVEs from VulnCheck’s research teams]]></summary>
        <author>
            <name>Caitlin Condon</name>
            <uri>https://www.linkedin.com/in/ccondon/</uri>
        </author>
        <published>2025-10-09T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[THREATCON1 2025 Recap: A New Standard for Cybersecurity Events]]></title>
        <id>/blog/2025-threatcon1-recap</id>
        <link href="https://www.vulncheck.com/blog/2025-threatcon1-recap"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/2025-threatcon1-recap/og.png" type="image/png"/>
        <updated>2025-10-06T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck's inaugural THREATCON1 event brought together hundreds of cybersecurity professionals for a groundbreaking conference focused on emerging threats and innovative solutions.]]></summary>
        <author>
            <name>Tom Bain</name>
            <uri>https://twitter.com/tmbainjr1</uri>
        </author>
        <published>2025-10-06T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Oracle E-Business Suite CVE-2025-61882 Exploited in Extortion Attacks]]></title>
        <id>/blog/oracle-e-business-suite-cve-2025-61882-exploited-in-extortion-attacks</id>
        <link href="https://www.vulncheck.com/blog/oracle-e-business-suite-cve-2025-61882-exploited-in-extortion-attacks"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/oracle-e-business-suite-cve-2025-61882-exploited-in-extortion-attacks/og.png" type="image/png"/>
        <updated>2025-10-06T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[A new Oracle E-Business Suite zero-day vulnerability is being linked to a Cl0p extortion campaign that exfiltrated EBS data from Oracle customer environments]]></summary>
        <author>
            <name>Caitlin Condon</name>
            <uri>https://www.linkedin.com/in/ccondon/</uri>
        </author>
        <published>2025-10-06T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[CVE-2025-10035: Critical Vulnerability in Fortra GoAnywhere MFT]]></title>
        <id>/blog/cve-2025-10035-fortra-go-anywhere-mft</id>
        <link href="https://www.vulncheck.com/blog/cve-2025-10035-fortra-go-anywhere-mft"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/cve-2025-10035-fortra-go-anywhere-mft/og.png" type="image/png"/>
        <updated>2025-09-19T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[A new critical vulnerability was disclosed in Fortra's GoAnywhere managed file transfer product, which has been targeted in the past by ransomware and extortion groups]]></summary>
        <author>
            <name>Caitlin Condon</name>
            <uri>https://www.linkedin.com/in/ccondon/</uri>
        </author>
        <published>2025-09-19T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Getting Ahead of Exploitation with Initial Access Intelligence]]></title>
        <id>/blog/vulncheck-initial-access</id>
        <link href="https://www.vulncheck.com/blog/vulncheck-initial-access"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/vulncheck-initial-access/og.png" type="image/png"/>
        <updated>2025-09-11T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[IAI delivers production-ready, validated exploits and detections for vulnerabilities  most likely to be exploited for initial access and most likely to be added to CISA’s Known Exploited Vulnerabilities (KEV) catalog.]]></summary>
        <author>
            <name>Tim Roberts</name>
            <uri>https://www.linkedin.com/in/timroberts213/</uri>
        </author>
        <published>2025-09-11T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[VulnCheck Insights: CVE Context at the Hover of Your Cursor]]></title>
        <id>/blog/vulncheck-insights-chrome-extension</id>
        <link href="https://www.vulncheck.com/blog/vulncheck-insights-chrome-extension"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/vulncheck-insights-chrome-extension/og.png" type="image/png"/>
        <updated>2025-09-08T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Instead of bouncing between tabs, you now get instant, current context the moment a CVE appears on your screen.]]></summary>
        <author>
            <name>Kimber Duke</name>
            <uri>https://www.linkedin.com/in/kimberduke/</uri>
        </author>
        <published>2025-09-08T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[New Citrix NetScaler Zero-Day Vulnerability Exploited in the Wild]]></title>
        <id>/blog/new-citrix-netscaler-zero-day-vulnerability-exploited-in-the-wild</id>
        <link href="https://www.vulncheck.com/blog/new-citrix-netscaler-zero-day-vulnerability-exploited-in-the-wild"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/new-citrix-netscaler-zero-day-vulnerability-exploited-in-the-wild/og.png" type="image/png"/>
        <updated>2025-08-26T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Three new Citrix NetScaler vulnerabilities were disclosed on August 26, including CVE-2025-7775, a fresh zero-day flaw being used in the wild]]></summary>
        <author>
            <name>Caitlin Condon</name>
            <uri>https://www.linkedin.com/in/ccondon/</uri>
        </author>
        <published>2025-08-26T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[ScriptCase - Hunt It, Exploit It, Defend It]]></title>
        <id>/blog/scriptcase-rce</id>
        <link href="https://www.vulncheck.com/blog/scriptcase-rce"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/scriptcase-rce/og.png" type="image/png"/>
        <updated>2025-08-14T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[A month after disclosure, hundreds of ScriptCase servers remain exposed and actively targeted. This post walks through finding vulnerable instances, exploiting them with just a few curl commands, and the key detection points defenders can use to stop attacks.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2025-08-14T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Dispatch from the Desert: VulnCheck at BlackHat, Security Wasteland, and DEFCON]]></title>
        <id>/blog/blackhat-2025-review</id>
        <link href="https://www.vulncheck.com/blog/blackhat-2025-review"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/blackhat-2025-review/og.png" type="image/png"/>
        <updated>2025-08-12T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Recapping our 2025 BlackHat and Defcon experience.]]></summary>
        <author>
            <name>Kimber Duke</name>
            <uri>https://www.linkedin.com/in/kimberduke/</uri>
        </author>
        <published>2025-08-12T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Command Injection in Jenkins via Git Parameter (CVE-2025-53652)]]></title>
        <id>/blog/git-parameter-rce</id>
        <link href="https://www.vulncheck.com/blog/git-parameter-rce"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/git-parameter-rce/og.png" type="image/png"/>
        <updated>2025-08-07T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[CVE-2025-53652 was disclosed as a medium-severity vulnerability in the Jenkins Git Parameter plugin but it enables command injection and remote code execution when this popular plugin is installed. We break down the vulnerability and share detection guidance for defenders.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2025-08-07T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Still Up. Still Evil.]]></title>
        <id>/blog/stillup-stillevil</id>
        <link href="https://www.vulncheck.com/blog/stillup-stillevil"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/stillup-stillevil/og.png" type="image/png"/>
        <updated>2025-07-31T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck tracked thousands of attacker systems over a 90-day window to see how long malicious infrastructure really lasts. The results show that exposure doesn’t mean disruption, as many phishing kits, proxies, and C2 tools stay online for weeks or even months.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2025-07-31T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[State of Exploitation - A look Into The 1H-2025 Vulnerability Exploitation & Threat Activity]]></title>
        <id>/blog/state-of-exploitation-1h-2025</id>
        <link href="https://www.vulncheck.com/blog/state-of-exploitation-1h-2025"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/state-of-exploitation-1h-2025/og.png" type="image/png"/>
        <updated>2025-07-30T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[A Look into the Last 6-months of Vulnerability Exploitation… January-June 2025]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2025-07-30T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Novel Use of "mount" Spotted in Hikvision Attacks]]></title>
        <id>/blog/hikvision-mount-shell</id>
        <link href="https://www.vulncheck.com/blog/hikvision-mount-shell"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/hikvision-mount-shell/og.png" type="image/png"/>
        <updated>2025-07-24T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck researchers spotted a novel use of the "mount" command in real-world exploitation of Hikvision CVE-2021-36260. The attacker used NFS to drop and execute binaries, bypassing traditional download methods and evading common detection signatures. This technique has since been integrated into VulnCheck’s open-source go-exploit framework.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2025-07-24T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[The Linuxsys Cryptominer]]></title>
        <id>/blog/linuxsys-cryptominer</id>
        <link href="https://www.vulncheck.com/blog/linuxsys-cryptominer"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/linuxsys-cryptominer/og.png" type="image/png"/>
        <updated>2025-07-17T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck observes exploitation of CVE-2021-41773 in the wild, and attributes the attack to the Linuxsys cryptominer. The team additionally discovers that the cryptominer has been part of a long-running campaign exploiting multiple vulnerabilities with a consistent attacker methodology since at least 2021.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2025-07-17T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Expanding VulnCheck’s KEV: Auditing ShadowServer, New CVE Assignments, and Source Expansion]]></title>
        <id>/blog/kev-expansion-2025</id>
        <link href="https://www.vulncheck.com/blog/kev-expansion-2025"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/kev-expansion-2025/og.png" type="image/png"/>
        <updated>2025-07-10T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Expanding VulnCheck’s KEV: Auditing ShadowServer, New CVE Assignments, and Source Expansion]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2025-07-10T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[VulnCheck Integrates with ThreatQuotient: Operationalize Exploit Intelligence in the ThreatQ Platform and is Now Generally Available on the ThreatQ Marketplace]]></title>
        <id>/blog/vulncheck-threatquotient-partnership</id>
        <link href="https://www.vulncheck.com/blog/vulncheck-threatquotient-partnership"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/vulncheck-threatquotient-partnership/og.png" type="image/png"/>
        <updated>2025-07-02T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[This integration brings VulnCheck’s exploit-centric vulnerability intelligence directly into ThreatQ, enabling joint customers to supercharge threat operations, vulnerability prioritization, and incident response with real-world exploit data.]]></summary>
        <author>
            <name>Tom Bain</name>
            <uri>https://twitter.com/tmbainjr1</uri>
        </author>
        <published>2025-07-02T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Timely Threat Intelligence for Defenders with VulnCheck KEV Alerts]]></title>
        <id>/blog/vulncheck-kev-alerts</id>
        <link href="https://www.vulncheck.com/blog/vulncheck-kev-alerts"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/vulncheck-kev-alerts/og.png" type="image/png"/>
        <updated>2025-06-25T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[We're excited to announce the expansion of VulnCheck Community to include VulnCheck KEV Alerts via Email and Slack]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2025-06-25T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[CVE Fragility Is Real, But Totally Fixable.]]></title>
        <id>/blog/cve-fragility</id>
        <link href="https://www.vulncheck.com/blog/cve-fragility"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/cve-fragility/og.png" type="image/png"/>
        <updated>2025-05-23T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Forrester’s recent blog by Eric Nost, Mitregeddon Averted, But Fragility in CVE Processes Remain, shines a much-needed spotlight on the systemic challenges facing the CVE and NVD ecosystem from the industry analyst perspective.]]></summary>
        <author>
            <name>Tom Bain</name>
            <uri>https://twitter.com/tmbainjr1</uri>
        </author>
        <published>2025-05-23T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Understanding Exploit Proof-of-Concept]]></title>
        <id>/blog/understanding-exploit-proof-of-concept</id>
        <link href="https://www.vulncheck.com/blog/understanding-exploit-proof-of-concept"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/understanding-exploit-proof-of-concept/og.png" type="image/png"/>
        <updated>2025-05-23T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Exploit Intel 101 - Understanding Exploit Proof-of-Concept]]></summary>
        <author>
            <name>Tom Bain</name>
            <uri>https://twitter.com/tmbainjr1</uri>
        </author>
        <published>2025-05-23T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Understanding Initial Access Exploits]]></title>
        <id>/blog/understanding-initial-access-exploits</id>
        <link href="https://www.vulncheck.com/blog/understanding-initial-access-exploits"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/understanding-initial-access-exploits/og.png" type="image/png"/>
        <updated>2025-05-23T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Exploit Intel 101 - Understanding Initial Access Exploits]]></summary>
        <author>
            <name>Tom Bain</name>
            <uri>https://twitter.com/tmbainjr1</uri>
        </author>
        <published>2025-05-23T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Understanding Exploit Availability]]></title>
        <id>/blog/understanding-exploit-availability</id>
        <link href="https://www.vulncheck.com/blog/understanding-exploit-availability"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/understanding-exploit-availability/og.png" type="image/png"/>
        <updated>2025-05-21T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Exploit Intel 101 - Understanding Exploit Availability]]></summary>
        <author>
            <name>Tom Bain</name>
            <uri>https://twitter.com/tmbainjr1</uri>
        </author>
        <published>2025-05-21T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Understanding Exploit Maturity]]></title>
        <id>/blog/understanding-exploit-maturity</id>
        <link href="https://www.vulncheck.com/blog/understanding-exploit-maturity"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/understanding-exploit-maturity/og.png" type="image/png"/>
        <updated>2025-05-21T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Exploit Intel 101 - Understanding Exploit Maturity]]></summary>
        <author>
            <name>Tom Bain</name>
            <uri>https://twitter.com/tmbainjr1</uri>
        </author>
        <published>2025-05-21T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Understanding Software Dependency Graphs]]></title>
        <id>/blog/understanding-software-dependency-graphs</id>
        <link href="https://www.vulncheck.com/blog/understanding-software-dependency-graphs"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/understanding-software-dependency-graphs/og.png" type="image/png"/>
        <updated>2025-05-21T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Exploit Intel 101 - Understanding Software Dependency Graphs]]></summary>
        <author>
            <name>Tom Bain</name>
            <uri>https://twitter.com/tmbainjr1</uri>
        </author>
        <published>2025-05-21T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Understanding Software Supply Chain Security]]></title>
        <id>/blog/understanding-software-supply-chain-security</id>
        <link href="https://www.vulncheck.com/blog/understanding-software-supply-chain-security"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/understanding-software-supply-chain-security/og.png" type="image/png"/>
        <updated>2025-05-21T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Exploit Intel 101 - Understanding Software Supply Chain Security]]></summary>
        <author>
            <name>Tom Bain</name>
            <uri>https://twitter.com/tmbainjr1</uri>
        </author>
        <published>2025-05-21T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Does ENISA EUVD live up to all the hype?]]></title>
        <id>/blog/enisa-euvd</id>
        <link href="https://www.vulncheck.com/blog/enisa-euvd"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/enisa-euvd/og.png" type="image/png"/>
        <updated>2025-05-20T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[This research aims to share experiences and observations to help others better understand how ENISA EUVD compares with existing vulnerability sources and whether it can serve as a reliable alternative for these established services.]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2025-05-20T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[2025 Q1 Trends in Vulnerability Exploitation]]></title>
        <id>/blog/exploitation-trends-q1-2025</id>
        <link href="https://www.vulncheck.com/blog/exploitation-trends-q1-2025"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/exploitation-trends-q1-2025/og.png" type="image/png"/>
        <updated>2025-04-24T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[In Q1 2025, VulnCheck identified evidence of 159 CVEs publicly disclosed for the first time as exploited in the wild.]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2025-04-24T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Understanding Command & Control (C2) Infrastructure]]></title>
        <id>/blog/understanding-command-control-infrastructure</id>
        <link href="https://www.vulncheck.com/blog/understanding-command-control-infrastructure"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/understanding-command-control-infrastructure/og.png" type="image/png"/>
        <updated>2025-04-21T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Exploit Intel 101 - Understanding Command & Control (C2) Infrastructure]]></summary>
        <author>
            <name>Tom Bain</name>
            <uri>https://twitter.com/tmbainjr1</uri>
        </author>
        <published>2025-04-21T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Attacker Infrastructure]]></title>
        <id>/blog/attacker-infrastructure</id>
        <link href="https://www.vulncheck.com/blog/attacker-infrastructure"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/attacker-infrastructure/og.png" type="image/png"/>
        <updated>2025-04-18T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Exploit Intel 101 - Attacker Infrastructure]]></summary>
        <author>
            <name>Tom Bain</name>
            <uri>https://twitter.com/tmbainjr1</uri>
        </author>
        <published>2025-04-18T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Understanding APTs]]></title>
        <id>/blog/understanding-apts</id>
        <link href="https://www.vulncheck.com/blog/understanding-apts"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/understanding-apts/og.png" type="image/png"/>
        <updated>2025-04-18T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Exploit Intel 101 - Understanding APTs]]></summary>
        <author>
            <name>Tom Bain</name>
            <uri>https://twitter.com/tmbainjr1</uri>
        </author>
        <published>2025-04-18T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[NIST’s New Deferred CVE Status: What It Means for Defenders]]></title>
        <id>/blog/nist-nvd-deferred</id>
        <link href="https://www.vulncheck.com/blog/nist-nvd-deferred"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/nist-nvd-deferred/og.png" type="image/png"/>
        <updated>2025-04-14T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck treats every CVE as a forever-day, because we know exploitation doesn’t adhere to timelines or maintenance cycles.]]></summary>
        <author>
            <name>Tony Wenzel</name>
            <uri>https://www.linkedin.com/in/awenzel/</uri>
        </author>
        <published>2025-04-14T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[VulnCheck & Filigran: Delivering Actionable Security Intelligence for the Enterprise]]></title>
        <id>/blog/vulncheck-filigran-parternship</id>
        <link href="https://www.vulncheck.com/blog/vulncheck-filigran-parternship"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/vulncheck-filigran-parternship/og.png" type="image/png"/>
        <updated>2025-03-27T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Filigran and VulnCheck are proud to announce a strategic partnership that transforms enterprise threat intelligence capabilities through seamless integration. This collaboration brings together Filigran's market-leading OpenCTI platform with VulnCheck's comprehensive exploit intelligence solutions, creating a powerful joint offering that delivers immediate business value to security teams to enable scalable, automated response actioning.]]></summary>
        <author>
            <name>Tom Bain</name>
            <uri>https://twitter.com/tmbainjr1</uri>
        </author>
        <published>2025-03-27T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Exploring VulnCheck Intelligence in OpenCTI]]></title>
        <id>/blog/opencti-integration</id>
        <link href="https://www.vulncheck.com/blog/opencti-integration"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/opencti-integration/og.png" type="image/png"/>
        <updated>2025-03-13T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck integrates with OpenCTI - an open-source Threat Intelligence Platform by Filigran]]></summary>
        <author>
            <name>EJ Reilly</name>
            <uri>https://www.linkedin.com/in/ej-reilly/</uri>
        </author>
        <published>2025-03-13T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[BigAnt Small Chain - CVE-2025-0364 Exploitation]]></title>
        <id>/blog/bigant-cve-2025-0364</id>
        <link href="https://www.vulncheck.com/blog/bigant-cve-2025-0364"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/bigant-cve-2025-0364/og.png" type="image/png"/>
        <updated>2025-02-27T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck identifies an unauthenticated remote code execution in the BigAnt chat server]]></summary>
        <author>
            <name>Cale Black</name>
            <uri>https://hosakacorp.net</uri>
        </author>
        <published>2025-02-27T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Exposing CVEs from Black Bastas' Chats]]></title>
        <id>/blog/black-basta-chats</id>
        <link href="https://www.vulncheck.com/blog/black-basta-chats"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/black-basta-chats/og.png" type="image/png"/>
        <updated>2025-02-24T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Late last week, chat logs from Black Basta became available, offering rare insight into the operations of one of the most infamous ransomware groups. This research focuses on the vulnerabilities and CVEs mentioned in these logs, with the goal of providing defenders with actionable intelligence on the tactics of Black Basta.]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2025-02-24T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Helping Enterprises & Governments Adopt Stakeholder Specific Vulnerability Categorization (SSVC)]]></title>
        <id>/blog/automating-ssvc</id>
        <link href="https://www.vulncheck.com/blog/automating-ssvc"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/automating-ssvc/og.png" type="image/png"/>
        <updated>2025-02-13T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck now provides automated SSVC decisions for federal and enterprise agencies.]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2025-02-13T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Zyxel HTTP Vulnerability]]></title>
        <id>/blog/zyxel-http-vuln</id>
        <link href="https://www.vulncheck.com/blog/zyxel-http-vuln"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/zyxel-http-vuln/og.png" type="image/png"/>
        <updated>2025-02-07T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[As a follow-up to our previous Zyxel Telnet Vulnerabilities blog, VulnCheck examines CVE-2024-40890, a recently disclosed vulnerability in the HTTP interface of many end-of-life Zyxel CPE routers.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2025-02-07T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Zyxel Telnet Vulnerabilities]]></title>
        <id>/blog/zyxel-telnet-vulns</id>
        <link href="https://www.vulncheck.com/blog/zyxel-telnet-vulns"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/zyxel-telnet-vulns/og.png" type="image/png"/>
        <updated>2025-02-04T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck and partner GreyNoise discovered Zyxel-related vulnerabilities being targeted in the wild. In this blog, VulnCheck describes the vulnerabilities CVE-2024-40891 and CVE-2025-0890.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2025-02-04T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[2024 Trends in Vulnerability Exploitation]]></title>
        <id>/blog/2024-exploitation-trends</id>
        <link href="https://www.vulncheck.com/blog/2024-exploitation-trends"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/2024-exploitation-trends/og.png" type="image/png"/>
        <updated>2025-02-03T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[In September, VulnCheck identified evidence of 78 CVEs that were publicly disclosed for the first time as exploited in the wild.]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2025-02-03T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[New Year, New UI]]></title>
        <id>/blog/new-year-new-ui</id>
        <link href="https://www.vulncheck.com/blog/new-year-new-ui"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/new-year-new-ui/og.png" type="image/png"/>
        <updated>2025-01-30T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck's new update enhances our CVE pages bringing actionable threat intelligence to the forefront.]]></summary>
        <author>
            <name>Kimber Duke</name>
            <uri>https://www.linkedin.com/in/kimberduke/</uri>
        </author>
        <published>2025-01-30T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[VulnCheck Initial Access Intelligence - 2024 Year in Review]]></title>
        <id>/blog/vulncheck-iai-2024</id>
        <link href="https://www.vulncheck.com/blog/vulncheck-iai-2024"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/vulncheck-iai-2024/og.png" type="image/png"/>
        <updated>2025-01-29T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[In 2024, VulnCheck's Initial Access Intelligence (IAI) team delivered custom exploits and detection artifacts for 169 CVEs. Among these, 99 CVEs (58.6%) were actively exploited in the wild.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2025-01-29T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Four-Faith Industrial Router CVE-2024-12856 Exploited in the Wild]]></title>
        <id>/blog/four-faith-cve-2024-12856</id>
        <link href="https://www.vulncheck.com/blog/four-faith-cve-2024-12856"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/four-faith-cve-2024-12856/og.png" type="image/png"/>
        <updated>2024-12-27T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck discovers that a new vulnerability affecting Four-Faith industrial routers has been exploited in the wild]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2024-12-27T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Are the Top 25 CWEs Truly the Most Dangerous Software Weaknesses in 2024?]]></title>
        <id>/blog/cwe-top-25-2024</id>
        <link href="https://www.vulncheck.com/blog/cwe-top-25-2024"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/cwe-top-25-2024/og.png" type="image/png"/>
        <updated>2024-12-19T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[In November, Mitre released the 2024 CWE Top 25 Most Dangerous Software Weaknesses list. Today, VulnCheck issued a report re-evaluating the rankings with a threat-centric approach.]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2024-12-19T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Active C2 Servers]]></title>
        <id>/blog/active-c2-servers</id>
        <link href="https://www.vulncheck.com/blog/active-c2-servers"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/active-c2-servers/og.png" type="image/png"/>
        <updated>2024-12-12T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Exploit Intel 101 - Active C2 Servers]]></summary>
        <author>
            <name>Tom Bain</name>
            <uri>https://twitter.com/tmbainjr1</uri>
        </author>
        <published>2024-12-12T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Common Vulnerability Scoring System (CVSS)]]></title>
        <id>/blog/common-vulnerability-scoring-system</id>
        <link href="https://www.vulncheck.com/blog/common-vulnerability-scoring-system"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/common-vulnerability-scoring-system/og.png" type="image/png"/>
        <updated>2024-12-12T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Exploit Intel 101 - Common Vulnerability Scoring System (CVSS)]]></summary>
        <author>
            <name>Tom Bain</name>
            <uri>https://twitter.com/tmbainjr1</uri>
        </author>
        <published>2024-12-12T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Detecting Exploitation w/ VulnCheck Initial Access Intelligence - November 2024]]></title>
        <id>/blog/initial-access-intelligence-november-2024</id>
        <link href="https://www.vulncheck.com/blog/initial-access-intelligence-november-2024"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/initial-access-intelligence-november-2024/og.png" type="image/png"/>
        <updated>2024-12-11T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[In November 2024, VulnCheck developed new Initial Access Intelligence (IAI) artifacts for 15 CVEs, covering 14 different vendors and products.]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2024-12-11T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[A Peek Into the Known Exploited Vulnerabilities of 2024]]></title>
        <id>/blog/comparing-kevs-jupyter</id>
        <link href="https://www.vulncheck.com/blog/comparing-kevs-jupyter"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/comparing-kevs-jupyter/og.png" type="image/png"/>
        <updated>2024-12-05T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck now provides an automated approach to providing broader visibility into differences between VulnCheck KEV and CISA KEV through a Jupyter Notebook publicly available on GitHub.]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2024-12-05T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Common Vulnerabilities and Exposures]]></title>
        <id>/blog/common-vulnerabilities-and-exposures</id>
        <link href="https://www.vulncheck.com/blog/common-vulnerabilities-and-exposures"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/common-vulnerabilities-and-exposures/og.png" type="image/png"/>
        <updated>2024-12-04T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Exploit Intel 101 - Common Vulnerabilities and Exposures (CVE)]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2024-12-04T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Understanding Exploits]]></title>
        <id>/blog/understanding-exploits</id>
        <link href="https://www.vulncheck.com/blog/understanding-exploits"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/understanding-exploits/og.png" type="image/png"/>
        <updated>2024-12-04T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Exploit Intel 101 - Understanding Exploits]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2024-12-04T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Vulnerability Exchange Formats - CycloneDX, SPDX, VDR, and VEX]]></title>
        <id>/blog/vulnerability-exchange-formats</id>
        <link href="https://www.vulncheck.com/blog/vulnerability-exchange-formats"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/vulnerability-exchange-formats/og.png" type="image/png"/>
        <updated>2024-12-04T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Exploit Intel 101 - Vulnerability Exchange Formats (CycloneDX, SPDX, VDR, and VEX)]]></summary>
        <author>
            <name>Tom Bain</name>
            <uri>https://twitter.com/tmbainjr1</uri>
        </author>
        <published>2024-12-04T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Vulnerability Prioritization]]></title>
        <id>/blog/vulnerability-prioritization-101</id>
        <link href="https://www.vulncheck.com/blog/vulnerability-prioritization-101"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/vulnerability-prioritization-101/og.png" type="image/png"/>
        <updated>2024-12-04T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Exploit Intel 101 - Vulnerability Prioritization]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2024-12-04T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Exploit Intelligence]]></title>
        <id>/blog/exploit-intelligence</id>
        <link href="https://www.vulncheck.com/blog/exploit-intelligence"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/exploit-intelligence/og.png" type="image/png"/>
        <updated>2024-12-02T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Exploit Intel 101 - Exploit Intelligence and the Role of Threat Actor Intelligence in Cybersecurity Products]]></summary>
        <author>
            <name>Tom Bain</name>
            <uri>https://twitter.com/tmbainjr1</uri>
        </author>
        <published>2024-12-02T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[ProjectSend CVE-2024-11680 Exploited in the Wild]]></title>
        <id>/blog/projectsend-exploited-itw</id>
        <link href="https://www.vulncheck.com/blog/projectsend-exploited-itw"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/projectsend-exploited-itw/og.png" type="image/png"/>
        <updated>2024-11-26T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck discovers evidence that ProjectSend has been exploited in the wild and assigns CVE-2024-11680]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2024-11-26T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Exploring CISA’s 2023 Top Routinely Exploited Vulnerabilities]]></title>
        <id>/blog/cisa-top-exploited-2024</id>
        <link href="https://www.vulncheck.com/blog/cisa-top-exploited-2024"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/cisa-top-exploited-2024/og.png" type="image/png"/>
        <updated>2024-11-22T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[In September, VulnCheck identified evidence of 78 CVEs that were publicly disclosed for the first time as exploited in the wild.]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2024-11-22T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Outpacing NIST NVD with VulnCheck NVD++]]></title>
        <id>/blog/outpacing-nvd-cpe</id>
        <link href="https://www.vulncheck.com/blog/outpacing-nvd-cpe"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/outpacing-nvd-cpe/og.png" type="image/png"/>
        <updated>2024-11-14T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck NVD++ provides CPE for 76.95% of CVEs published in 2024 while NIST NVD only provides CPE for 41.35% of CVEs]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2024-11-14T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Detecting Exploitation w/ VulnCheck Initial Access Intelligence - October 2024]]></title>
        <id>/blog/initial-access-intelligence-october-2024</id>
        <link href="https://www.vulncheck.com/blog/initial-access-intelligence-october-2024"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/initial-access-intelligence-october-2024/og.png" type="image/png"/>
        <updated>2024-11-12T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[In October 2024, VulnCheck developed new Initial Access Intelligence (IAI) artifacts for 21 CVEs, covering 16 different vendors and products.]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2024-11-12T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Introducing a New Command-and-Control Feature in go-exploit: The ShellTunnel]]></title>
        <id>/blog/go-exploit-shelltunnel</id>
        <link href="https://www.vulncheck.com/blog/go-exploit-shelltunnel"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/go-exploit-shelltunnel/og.png" type="image/png"/>
        <updated>2024-11-01T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[The latest feature to hit go-exploit is ShellTunnel. ShellTunnel captures reverse shell traffic and routes it through an intermediary attacker-controlled server before reaching the main command-and-control (C2) server.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2024-11-01T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Exploring ABB Vulnerabilities and Their Impact on Industrial Control Systems]]></title>
        <id>/blog/exploring-abb-ics-vulns</id>
        <link href="https://www.vulncheck.com/blog/exploring-abb-ics-vulns"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/exploring-abb-ics-vulns/og.png" type="image/png"/>
        <updated>2024-10-30T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[We explore two key vulnerabilities in ABB's building automation and energy management software, ABB Cylon Aspect.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2024-10-30T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Bring VulnCheck Intelligence to Your Python and Go Apps with Our New SDKs]]></title>
        <id>/blog/python-go-sdk</id>
        <link href="https://www.vulncheck.com/blog/python-go-sdk"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/python-go-sdk/og.png" type="image/png"/>
        <updated>2024-10-24T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck delivers intelligence to Your Python and Go Applications with our new SDKs]]></summary>
        <author>
            <name>EJ Reilly</name>
            <uri>https://www.linkedin.com/in/ej-reilly/</uri>
        </author>
        <published>2024-10-24T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Reducing Attack Surface Risk]]></title>
        <id>/blog/reducing-attack-surface-risk-oem-series</id>
        <link href="https://www.vulncheck.com/blog/reducing-attack-surface-risk-oem-series"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/reducing-attack-surface-risk-oem-series/og.png" type="image/png"/>
        <updated>2024-10-23T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[OEM Use Case Series: Reducing Attack Surface Risk - Know Who Your Adversaries Are and How Naming Conventions Matter in Vulnerability Management]]></summary>
        <author>
            <name>Tom Bain</name>
            <uri>https://twitter.com/tmbainjr1</uri>
        </author>
        <published>2024-10-23T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Bring VulnCheck Anywhere w/ VulnCheck CLI]]></title>
        <id>/blog/vulncheck-cli-anywhere</id>
        <link href="https://www.vulncheck.com/blog/vulncheck-cli-anywhere"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/vulncheck-cli-anywhere/og.png" type="image/png"/>
        <updated>2024-10-22T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck delivers intelligence to the command line with VulnCheck’s new open source tool, VulnCheck CLI.]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2024-10-22T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[VulnCheck Exploited Vulnerabilities Report - September 2024]]></title>
        <id>/blog/kev-report-september-2024</id>
        <link href="https://www.vulncheck.com/blog/kev-report-september-2024"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/kev-report-september-2024/og.png" type="image/png"/>
        <updated>2024-10-13T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[In September, VulnCheck identified evidence of 78 CVEs that were publicly disclosed for the first time as exploited in the wild.]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2024-10-13T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[VulnCheck Initial Access Intelligence Update - September 2024]]></title>
        <id>/blog/initial-access-intelligence-september-2024</id>
        <link href="https://www.vulncheck.com/blog/initial-access-intelligence-september-2024"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/initial-access-intelligence-september-2024/og.png" type="image/png"/>
        <updated>2024-10-09T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[In September 2024, we developed new Initial Access Intelligence (IAI) artifacts for 16 CVEs, covering 14 different vendors and products.]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2024-10-09T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Following the Trail of Flax Typhoon to Uncover Newly Discovered Vulnerabilities in Linear Emerge Access Control Devices]]></title>
        <id>/blog/flax-typhoon-linear-merge</id>
        <link href="https://www.vulncheck.com/blog/flax-typhoon-linear-merge"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/flax-typhoon-linear-merge/og.png" type="image/png"/>
        <updated>2024-10-08T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[A newly disclosed vulnerability, CVE-2024-9441, affects the Linear Emerge E3 series. The vulnerability has not yet been patched by the vendor, and exploits are already circulating, raising concerns of imminent exploitation.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2024-10-08T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Danger is Still Lurking in the NVD Backlog]]></title>
        <id>/blog/nvd-backlog-exploitation-lurking</id>
        <link href="https://www.vulncheck.com/blog/nvd-backlog-exploitation-lurking"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/nvd-backlog-exploitation-lurking/og.png" type="image/png"/>
        <updated>2024-09-30T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[A look into the real dangers of exploitation still lurking in the NVD Backlog]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2024-09-30T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Exploring Targeted Technologies and Countries of the Flax Typhoon Botnet]]></title>
        <id>/blog/flax-typhoon-botnet</id>
        <link href="https://www.vulncheck.com/blog/flax-typhoon-botnet"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/flax-typhoon-botnet/og.png" type="image/png"/>
        <updated>2024-09-23T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Last week, Five Eyes agencies issued a Joint Cybersecurity Advisory titled, “People's Republic of China-Linked Actors Compromise Routers and IoT Devices for Botnet Operations” which we explore in this blog post.]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2024-09-23T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[5 Ways to Enhance Your Security Product Offering with VulnCheck]]></title>
        <id>/blog/5-ways-to-enhance-your-security-product</id>
        <link href="https://www.vulncheck.com/blog/5-ways-to-enhance-your-security-product"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/5-ways-to-enhance-your-security-product/og.png" type="image/png"/>
        <updated>2024-09-17T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Discover 5 ways VulnCheck enhances your security product offering with real-time intelligence, detection capabilities, and expanded vulnerability visibility.]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2024-09-17T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Intelligence is the Most Important and Most Lucrative Asset in Cybersecurity]]></title>
        <id>/blog/mastercard-recorded-future-acquisition</id>
        <link href="https://www.vulncheck.com/blog/mastercard-recorded-future-acquisition"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/mastercard-recorded-future-acquisition/og.png" type="image/png"/>
        <updated>2024-09-13T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Recorded Future was acquired by Mastercard today for $2.65B, which is an encouraging macro indicator for the threat intelligence market and adjacent markets.]]></summary>
        <author>
            <name>Tom Bain</name>
            <uri>https://twitter.com/tmbainjr1</uri>
        </author>
        <published>2024-09-13T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[VulnCheck Known Exploited Vulnerabilities Report - Summer 2024]]></title>
        <id>/blog/kev-report-summer-2024</id>
        <link href="https://www.vulncheck.com/blog/kev-report-summer-2024"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/kev-report-summer-2024/og.png" type="image/png"/>
        <updated>2024-09-12T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[During June, July, and August, we captured exploitation evidence for 158 vulnerabilities, with initial evidence emerging within this period for the first time. The evidence was collected from over 35 different sources.]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2024-09-12T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[VulnCheck go-exploit External C2s]]></title>
        <id>/blog/go-exploit-external-c2s</id>
        <link href="https://www.vulncheck.com/blog/go-exploit-external-c2s"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/go-exploit-external-c2s/og.png" type="image/png"/>
        <updated>2024-09-11T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Adding support for external C2 channels and payloads in the go-exploit framework to enable flexible exploitation interaction and platform integration.]]></summary>
        <author>
            <name>Cale Black</name>
            <uri>https://hosakacorp.net</uri>
        </author>
        <published>2024-09-11T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[VulnCheck Initial Access Intelligence Update - August 2024]]></title>
        <id>/blog/initial-access-intelligence-august-2024</id>
        <link href="https://www.vulncheck.com/blog/initial-access-intelligence-august-2024"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/initial-access-intelligence-august-2024/og.png" type="image/png"/>
        <updated>2024-09-04T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[In August 2024, we developed new Initial Access Intelligence (IAI) artifacts for 20 CVEs, covering 17 different vendors and products.]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2024-09-04T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Weaponized Vulnerabilities Deserve a Seat at The Prioritization Table]]></title>
        <id>/blog/metasploit-kev</id>
        <link href="https://www.vulncheck.com/blog/metasploit-kev"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/metasploit-kev/og.png" type="image/png"/>
        <updated>2024-08-27T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[To help security practitioners prioritize vulnerabilities using exploit evidence, we've outlined why weaponized vulnerabilities should be prioritized by mapping Metasploit modules and VulnCheck Known Exploited Vulnerabilities.]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2024-08-27T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[VulnCheck and ThreatConnect - Real-time Threat Visibility and the Most Comprehensive Asset Intelligence]]></title>
        <id>/blog/vulncheck-threatconnect-partnership</id>
        <link href="https://www.vulncheck.com/blog/vulncheck-threatconnect-partnership"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/vulncheck-threatconnect-partnership/og.png" type="image/png"/>
        <updated>2024-08-06T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck is partnering with ThreatConnect to deliver a new level of vulnerability prioritization to joint customers with VulnCheck exploit and vulnerability data integrated into ThreatConnect’s industry-leading TI Ops Platform.]]></summary>
        <author>
            <name>Tom Bain</name>
            <uri>https://twitter.com/tmbainjr1</uri>
        </author>
        <published>2024-08-06T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[State of Exploitation - A Peek into 1H-2024 Vulnerability Exploitation]]></title>
        <id>/blog/state-of-exploitation-1h-2024</id>
        <link href="https://www.vulncheck.com/blog/state-of-exploitation-1h-2024"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/state-of-exploitation-1h-2024/og.png" type="image/png"/>
        <updated>2024-08-05T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[A Look into the Last 6-months of Vulnerability Exploitation… January-June 2024]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2024-08-05T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[VulnCheck Initial Access Intelligence Update - July 2024]]></title>
        <id>/blog/initial-access-intelligence-july-2024</id>
        <link href="https://www.vulncheck.com/blog/initial-access-intelligence-july-2024"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/initial-access-intelligence-july-2024/og.png" type="image/png"/>
        <updated>2024-08-01T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[In July 2024, we developed new Initial Access Intelligence (IAI) artifacts for 14 CVEs, covering 13 different vendors and 10 different products.]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2024-08-01T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[VulnCheck and Sevco - Real-time Threat Visibility and the Most Comprehensive Asset Intelligence]]></title>
        <id>/blog/vulncheck-sevco</id>
        <link href="https://www.vulncheck.com/blog/vulncheck-sevco"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/vulncheck-sevco/og.png" type="image/png"/>
        <updated>2024-08-01T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Sevco is a market leader. Through this collaboration, Sevco has  integrated VulnCheck data to roll out a significant set of enhancements to its existing vulnerability prioritization and exposure management capabilities.]]></summary>
        <author>
            <name>Tom Bain</name>
            <uri>https://twitter.com/tmbainjr1</uri>
        </author>
        <published>2024-08-01T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[VulnCheck go-exploit Goes Scanless]]></title>
        <id>/blog/vulncheck-goes-scanless</id>
        <link href="https://www.vulncheck.com/blog/vulncheck-goes-scanless"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/vulncheck-goes-scanless/og.png" type="image/png"/>
        <updated>2024-07-25T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Demonstrating the new scanless feature in the go-exploit exploit framework.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2024-07-25T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[VulnCheck Initial Access Intelligence Update - June 2024]]></title>
        <id>/blog/initial-access-intelligence-june-2024</id>
        <link href="https://www.vulncheck.com/blog/initial-access-intelligence-june-2024"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/initial-access-intelligence-june-2024/og.png" type="image/png"/>
        <updated>2024-07-19T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[In June 2024, we developed new Initial Access Intelligence (IAI) artifacts for 15 CVEs, covering 13 different vendors and 13 different products.]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2024-07-19T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Top 5 Reasons to Use VulnCheck Community]]></title>
        <id>/blog/top-5-reasons-to-use-vulncheck-community</id>
        <link href="https://www.vulncheck.com/blog/top-5-reasons-to-use-vulncheck-community"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/top-5-reasons-to-use-vulncheck-community/og.png" type="image/png"/>
        <updated>2024-07-17T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck Community delivers timely and valuable vulnerability intelligence at machine speeds]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2024-07-17T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Taking an Evidence-Based Approach to Vulnerability Prioritization]]></title>
        <id>/blog/vulnerability-prioritization</id>
        <link href="https://www.vulncheck.com/blog/vulnerability-prioritization"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/vulnerability-prioritization/og.png" type="image/png"/>
        <updated>2024-06-25T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[To help security practitioners prioritize vulnerabilities using exploit evidence, we've outlined key considerations and strategies in this blog. Alongside exploit intelligence, it’s crucial to incorporate environmental and asset context using decision-based frameworks such as Stakeholder-Specific Vulnerability Categorization.]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2024-06-25T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[VulnCheck Exploited Vulnerabilities Report - May 2024]]></title>
        <id>/blog/kev-report-may-2024</id>
        <link href="https://www.vulncheck.com/blog/kev-report-may-2024"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/kev-report-may-2024/og.png" type="image/png"/>
        <updated>2024-06-13T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[In May, VulnCheck identified evidence of 103 CVEs that were publicly disclosed for the first time as exploited in the wild, marking a 90.7% increase over April.]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2024-06-13T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[VulnCheck Initial Access Intelligence Update - May 2024]]></title>
        <id>/blog/initial-access-intelligence-may-2024</id>
        <link href="https://www.vulncheck.com/blog/initial-access-intelligence-may-2024"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/initial-access-intelligence-may-2024/og.png" type="image/png"/>
        <updated>2024-06-07T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[In May 2024, we developed new Initial Access Intelligence (IAI) artifacts for 20 CVEs, covering 16 different vendors and 18 different products.]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2024-06-07T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[The Real Danger Lurking in the NVD Backlog]]></title>
        <id>/blog/nvd-backlog-exploitation</id>
        <link href="https://www.vulncheck.com/blog/nvd-backlog-exploitation"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/nvd-backlog-exploitation/og.png" type="image/png"/>
        <updated>2024-05-23T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[A look into the real dangers of exploitation lurking in the NVD Backlog]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2024-05-23T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Expanding Access to CVE Data - CVE Program’s CVE List added to VulnCheck Community]]></title>
        <id>/blog/cve-community</id>
        <link href="https://www.vulncheck.com/blog/cve-community"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/cve-community/og.png" type="image/png"/>
        <updated>2024-05-16T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Given the security community's ongoing concerns about the reliability and performance of NIST's National Vulnerability Database, we recognized a growing need to address these challenges with alternative sources.]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2024-05-16T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[State of Exploitation - A Peek into the Last Decade of Vulnerability Exploitation]]></title>
        <id>/blog/state-of-exploitation-a-decade</id>
        <link href="https://www.vulncheck.com/blog/state-of-exploitation-a-decade"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/state-of-exploitation-a-decade/og.png" type="image/png"/>
        <updated>2024-05-05T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[A Look into the Last Decade of Vulnerability Exploitation… 2014 - 2023]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2024-05-05T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Verizon's 2024 DBIR Report - Mapping Mitre Att&CK tactics and techniques to Incident Classification Patterns]]></title>
        <id>/blog/verizon-dbir-2024-mitre</id>
        <link href="https://www.vulncheck.com/blog/verizon-dbir-2024-mitre"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/verizon-dbir-2024-mitre/og.png" type="image/png"/>
        <updated>2024-05-02T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Verizon's 2024 annual DBIR report incident classification patterns mapped to the Mitre Att&CK tactics and techniques.]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2024-05-02T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Verizon's 2024 DBIR Report - Mapping CIS Controls to Incident Classification Patterns]]></title>
        <id>/blog/2024-verizon-dbir</id>
        <link href="https://www.vulncheck.com/blog/2024-verizon-dbir"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/2024-verizon-dbir/og.png" type="image/png"/>
        <updated>2024-05-01T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Verizon's annual DBIR report incident classification patterns mapped to the Center for Internet Security's (CIS) Critical Security Controls.]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2024-05-01T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[VulnCheck's CPE Coverage Update (3-weeks after launch)]]></title>
        <id>/blog/nvd-cpe-update</id>
        <link href="https://www.vulncheck.com/blog/nvd-cpe-update"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/nvd-cpe-update/og.png" type="image/png"/>
        <updated>2024-04-15T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[To help close the enrichment gap for CVEs in the “Awaiting Analysis" status, VulnCheck generates CPEs from reliable sources and has made them available through our NVD++ service as “vcConfigurations”.]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2024-04-15T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Enhancing Access to NIST NVD data... Introducing CPE Enrichment in VulnCheck NVD++]]></title>
        <id>/blog/nvd-cpe</id>
        <link href="https://www.vulncheck.com/blog/nvd-cpe"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/nvd-cpe/og.png" type="image/png"/>
        <updated>2024-03-25T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[To help close the enrichment gap for CVEs in the “Awaiting Analysis’ status, VulnCheck prioritized the generation of CPEs from reliable sources and has started adding them into the JSON available through our NVD++ service as “vcConfigurations”.]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2024-03-25T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Enhancing Access to NIST NVD data... Introducing VulnCheck NVD++]]></title>
        <id>/blog/nvd-plus-plus</id>
        <link href="https://www.vulncheck.com/blog/nvd-plus-plus"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/nvd-plus-plus/og.png" type="image/png"/>
        <updated>2024-03-14T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Given the security community's ongoing concerns about the reliability, rate limits, and performance of NIST's National Vulnerability Database (NVD) 2.0 API, we recognized a growing need to address these challenges.]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2024-03-14T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Does Confluence Dream of Shells?]]></title>
        <id>/blog/confluence-dreams-of-shells</id>
        <link href="https://www.vulncheck.com/blog/confluence-dreams-of-shells"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/confluence-dreams-of-shells/og.png" type="image/png"/>
        <updated>2024-03-08T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Examining memory resident payloads landed with CVE-2023-22527.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2024-03-08T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Exploring the Anatomy of an Exploited CVE with VulnCheck KEV]]></title>
        <id>/blog/the-anatomy-of-an-exploited-cve</id>
        <link href="https://www.vulncheck.com/blog/the-anatomy-of-an-exploited-cve"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/the-anatomy-of-an-exploited-cve/og.png" type="image/png"/>
        <updated>2024-02-27T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Using VulnCheck KEV, we explore the anatomy of an exploited CVE. We map publicly available exploitation evidence to Atlassian Confluence CVE-2023-22527 to create a visual timeline of exploitation.]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2024-02-27T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[re: Zyxel VPN Series Pre-auth Remote Command Execution]]></title>
        <id>/blog/zyxel-cve-2023-33012</id>
        <link href="https://www.vulncheck.com/blog/zyxel-cve-2023-33012"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/zyxel-cve-2023-33012/og.png" type="image/png"/>
        <updated>2024-02-21T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck uncovers the truth behind the recently published Zyxel pre-auth remote code execution: limited to specific configurations, limitations on repeated exploitation, and no evidence of active exploitation.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2024-02-21T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Reimagining How We Think About Threat Actors]]></title>
        <id>/blog/how-we-think-about-threat-actors</id>
        <link href="https://www.vulncheck.com/blog/how-we-think-about-threat-actors"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/how-we-think-about-threat-actors/og.png" type="image/png"/>
        <updated>2024-02-15T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Taking a data-driven approach to visualizing the profile of threat actors can provide meaningful information without the time-consuming process of sifting through lengthy reports of information.]]></summary>
        <author>
            <name>Patrick Garrity</name>
            <uri>https://www.linkedin.com/in/patrickmgarrity/</uri>
        </author>
        <published>2024-02-15T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[There Are Too Many Damn Honeypots]]></title>
        <id>/blog/too-many-honeypots</id>
        <link href="https://www.vulncheck.com/blog/too-many-honeypots"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/too-many-honeypots/og.png" type="image/png"/>
        <updated>2024-02-02T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck faces a horde of honeypots while assessing the potential impact of Atlassian Confluence's CVE-2023-22527. This blog delves into Shodan queries to filter out honeypots and uncover the actual on-premise Confluence install base.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2024-02-02T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[7777-Botnet Infection Vectors]]></title>
        <id>/blog/ip-intel-7777-botnet</id>
        <link href="https://www.vulncheck.com/blog/ip-intel-7777-botnet"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/ip-intel-7777-botnet/og.png" type="image/png"/>
        <updated>2024-01-18T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck recently announced an IP Intelligence product that tracks attacker command & control (C2) infrastructure, as well as internet-facing potentially vulnerable systems. Using this data, we’ll explore the vulnerabilities that the 7777-Botnet is likely using to infect new hosts.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2024-01-18T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Weaponizing Apache OFBiz CVE-2023-51467]]></title>
        <id>/blog/ofbiz-cve-2023-51467</id>
        <link href="https://www.vulncheck.com/blog/ofbiz-cve-2023-51467"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/ofbiz-cve-2023-51467/og.png" type="image/png"/>
        <updated>2024-01-11T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck bypasses the Apache OFBiz Groovy sandbox to land a memory resident reverse shell.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2024-01-11T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Top 10 VulnCheck Research Blogs of 2023]]></title>
        <id>/blog/top-10-2023</id>
        <link href="https://www.vulncheck.com/blog/top-10-2023"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/top-10-2023/og.png" type="image/png"/>
        <updated>2023-12-26T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[In our last blog of 2023, we highlight the top 10 VulnCheck research blogs that explored new exploit techniques or exploitation in the wild.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2023-12-26T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[A Log4Shell Retrospective - Overblown and Exaggerated]]></title>
        <id>/blog/log4shell-retro</id>
        <link href="https://www.vulncheck.com/blog/log4shell-retro"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/log4shell-retro/og.png" type="image/png"/>
        <updated>2023-12-18T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Log4Shell was proclaimed one of the most critical vulnerabilities, but in this blog, VulnCheck challenges that perspective, revealing the limited number of vulnerable systems still present two years after the initial disclosure.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2023-12-18T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Why We Are Open-Sourcing NVD 1.0]]></title>
        <id>/blog/nvd-why</id>
        <link href="https://www.vulncheck.com/blog/nvd-why"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/nvd-why/og.png" type="image/png"/>
        <updated>2023-12-07T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Managing vulnerabilities at scale is something the entire cybersecurity ecosystem has struggled with for a long time.]]></summary>
        <author>
            <name>Tom Bain</name>
            <uri>https://twitter.com/tmbainjr1</uri>
        </author>
        <published>2023-12-07T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Hijackable Go Module Repositories]]></title>
        <id>/blog/go-repojacking</id>
        <link href="https://www.vulncheck.com/blog/go-repojacking"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/go-repojacking/og.png" type="image/png"/>
        <updated>2023-12-04T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck scans the Go module ecosystem for module repositories affected by repojacking, and discover hundreds of thousands of affected module-versions.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2023-12-04T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Executing from Memory Using ActiveMQ CVE-2023-46604]]></title>
        <id>/blog/cve-2023-44604-activemq-in-memory</id>
        <link href="https://www.vulncheck.com/blog/cve-2023-44604-activemq-in-memory"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/cve-2023-44604-activemq-in-memory/og.png" type="image/png"/>
        <updated>2023-11-15T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck finds a new way to exploit ActiveMQ CVE-2023-46604 that allows the attacker to hide in memory and avoid process-based detections.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2023-11-15T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Widespread Cisco IOS XE Implants in the Wild]]></title>
        <id>/blog/cisco-implants</id>
        <link href="https://www.vulncheck.com/blog/cisco-implants"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/cisco-implants/og.png" type="image/png"/>
        <updated>2023-10-17T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck scanned the internet for implanted Cisco IOS XE systems and found thousands of results.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2023-10-17T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Looking for CVE-2023-43261 in the Real World]]></title>
        <id>/blog/real-world-cve-2023-43261</id>
        <link href="https://www.vulncheck.com/blog/real-world-cve-2023-43261"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/real-world-cve-2023-43261/og.png" type="image/png"/>
        <updated>2023-10-13T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck was excited to breach ICS networks when CVE-2023-43261 was first disclosed. However, there is more to this than the CVE description would lead you to believe. Follow VulnCheck’s journey from CVE description to exploitation in the wild]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2023-10-13T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Growth Starts with People]]></title>
        <id>/blog/joining-vulncheck</id>
        <link href="https://www.vulncheck.com/blog/joining-vulncheck"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/joining-vulncheck/og.png" type="image/png"/>
        <updated>2023-10-12T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck is excited to announce four new leadership team additions!]]></summary>
        <author>
            <name>Tom Bain</name>
            <uri>https://twitter.com/tmbainjr1</uri>
        </author>
        <published>2023-10-12T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Fileless Remote Code Execution on Juniper Firewalls]]></title>
        <id>/blog/juniper-cve-2023-36845</id>
        <link href="https://www.vulncheck.com/blog/juniper-cve-2023-36845"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/juniper-cve-2023-36845/og.png" type="image/png"/>
        <updated>2023-09-18T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Learn about VulnCheck's development of an exploit for CVE-2023-36845, leading to stealthy code execution on Juniper firewalls, while also assessing the prevalence of unpatched systems in the wild.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2023-09-18T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Exposing RocketMQ CVE-2023-33246 Payloads]]></title>
        <id>/blog/rocketmq-exploit-payloads</id>
        <link href="https://www.vulncheck.com/blog/rocketmq-exploit-payloads"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/rocketmq-exploit-payloads/og.png" type="image/png"/>
        <updated>2023-09-05T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck demonstrates the use of the RocketMQ remoting protocol to retrieve the broker configuration file, and shares attacker payloads used in the wild for exploitation with CVE-2023-33246.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2023-09-05T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Exploitation of Openfire CVE-2023-32315]]></title>
        <id>/blog/openfire-cve-2023-32315</id>
        <link href="https://www.vulncheck.com/blog/openfire-cve-2023-32315"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/openfire-cve-2023-32315/og.png" type="image/png"/>
        <updated>2023-08-22T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[CVE-2023-32315 was first exploited in the wild in June 2023. However, VulnCheck has discovered an new approach to exploiting this vulnerability, streamlining the attack process and adeptly bypassing the generation of log entries. In addition, VulnCheck analyzes the remaining indicators of compromise and shares network detections.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2023-08-22T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Insight into the 2022 Top Routinely Exploited Vulnerabilities VulnCheck]]></title>
        <id>/blog/2022-top-exploited</id>
        <link href="https://www.vulncheck.com/blog/2022-top-exploited"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/2022-top-exploited/og.png" type="image/png"/>
        <updated>2023-08-09T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck provides additional insight into CISA's 2022 Top Routinely Exploited Vulnerabilities by looking at the availability of exploits and examining which threat actors, botnets, and ransomware crews used the vulnerabilities.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2023-08-09T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Exploiting MikroTik RouterOS Hardware with CVE-2023-30799]]></title>
        <id>/blog/mikrotik-foisted-revisited</id>
        <link href="https://www.vulncheck.com/blog/mikrotik-foisted-revisited"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/mikrotik-foisted-revisited/og.png" type="image/png"/>
        <updated>2023-07-25T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck develops an exploit that gets a root shell on MikroTik RouterOS.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2023-07-25T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Actively Exploited Industrial Control Systems Hardware - SolarView Series - Blog - VulnCheck]]></title>
        <id>/blog/solarview-exploitation</id>
        <link href="https://www.vulncheck.com/blog/solarview-exploitation"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/solarview-exploitation/og.png" type="image/png"/>
        <updated>2023-07-05T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck analyzes four CVEs that impact SolarView, a solar power monitoring system. We discover the number of internet-facing systems and the likelihood of exploitation in the wild.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2023-07-05T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Fake Security Researcher GitHub Repositories Deliver Malicious Implant Blog - VulnCheck]]></title>
        <id>/blog/fake-repos-deliver-malicious-implant</id>
        <link href="https://www.vulncheck.com/blog/fake-repos-deliver-malicious-implant"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/fake-repos-deliver-malicious-implant/og.png" type="image/png"/>
        <updated>2023-06-14T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck discovers a network of fake security researcher accounts promoting hidden malware.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2023-06-14T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Introducing go-exploit - An Exploit Framework for Go]]></title>
        <id>/blog/go-exploit</id>
        <link href="https://www.vulncheck.com/blog/go-exploit"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/go-exploit/og.png" type="image/png"/>
        <updated>2023-05-25T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[VulnCheck is excited to announce the open-source release of our in-house exploit framework, go-exploit. Designed with simplicity and portability in mind, go-exploit empowers exploit developers to create compact, self-contained, and consistent exploits.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2023-05-25T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[PaperCut Exploitation - A Different Path to Code Execution]]></title>
        <id>/blog/papercut-rce</id>
        <link href="https://www.vulncheck.com/blog/papercut-rce"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/papercut-rce/og.png" type="image/png"/>
        <updated>2023-05-04T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Public exploits and detections for CVE-2023-27350 focus on code execution using the PaperCut print scripting interface. In this blog, VulnCheck shares a new code execution vector and demonstrates how existing detections aren't robust enough to flag the new activity.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2023-05-04T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Analysis of Pre-Auth RCE in Sophos Web Appliance (CVE-2023-1671) VulnCheck]]></title>
        <id>/blog/cve-2023-1671-analysis</id>
        <link href="https://www.vulncheck.com/blog/cve-2023-1671-analysis"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/cve-2023-1671-analysis/og.png" type="image/png"/>
        <updated>2023-04-21T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[CVE-2023-1671 is a pre-authenticated command injection in Sophos Web Appliance. In this blog post, VulnCheck researchers analyze the vulnerability and develop a proof of concept (PoC) for it.]]></summary>
        <author>
            <name>William Vu</name>
            <uri>https://twitter.com/wvuuuuuuuuuuuuu</uri>
        </author>
        <published>2023-04-21T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Finding Something New About CVE-2022-1388]]></title>
        <id>/blog/new-cve-2022-1388</id>
        <link href="https://www.vulncheck.com/blog/new-cve-2022-1388"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/new-cve-2022-1388/og.png" type="image/png"/>
        <updated>2023-04-13T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[In search of an interesting new detail about CVE-2022-1388, VulnCheck researchers pore over open source intelligence. The researchers detail exploit variants, find signature bypasses, and publish a novel exploit variant.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2023-04-13T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[A Follow-up to the Exploit-DB and 0day.today Comparison]]></title>
        <id>/blog/exploit-database-followup</id>
        <link href="https://www.vulncheck.com/blog/exploit-database-followup"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/exploit-database-followup/og.png" type="image/png"/>
        <updated>2023-04-07T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Following reader suggestions, we take a deeper look at the types of vulnerabilities in the Exploit-DB and 0day.today exploit databases. We also examine exploit attack vectors and find out how many of the exploits have been used in the wild.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2023-04-07T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[A Comparison of Exploit-DB and 0day.today]]></title>
        <id>/blog/edb-0day-compare</id>
        <link href="https://www.vulncheck.com/blog/edb-0day-compare"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/edb-0day-compare/og.png" type="image/png"/>
        <updated>2023-03-31T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Exploit-DB and 0day.today are two of the largest public exploit databases. In this blog, we compare the databases to determine which one is the most relevant today.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2023-03-31T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Joomla! CVE-2023-23752 to Code Execution]]></title>
        <id>/blog/joomla-for-rce</id>
        <link href="https://www.vulncheck.com/blog/joomla-for-rce"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/joomla-for-rce/og.png" type="image/png"/>
        <updated>2023-03-23T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[CVE-2023-23752 is an information leak affecting Joomla! 4.0 - 4.7. How can an attacker use this vulnerability to achieve code execution? How many internet-facing systems are at risk?]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2023-03-23T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[The VulnCheck 2022 Exploited Vulnerability Report - Missing CISA KEV Catalog Entries - Blog - VulnCheck Catalog Entries]]></title>
        <id>/blog/2022-missing-kev-report</id>
        <link href="https://www.vulncheck.com/blog/2022-missing-kev-report"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/2022-missing-kev-report/og.png" type="image/png"/>
        <updated>2023-03-09T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[A review of the vulnerabilities that should have been added to the CISA KEV Catalog in 2022, but weren't.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2023-03-09T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[The VulnCheck 2022 Exploited Vulnerability Report - A Year Long the CISA KEV Catalog - Blog - VulnCheck Review of the CISA KEV Catalog]]></title>
        <id>/blog/2022-cisa-kev-review</id>
        <link href="https://www.vulncheck.com/blog/2022-cisa-kev-review"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/2022-cisa-kev-review/og.png" type="image/png"/>
        <updated>2023-03-02T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[A review of the vulnerabilities added to the CISA KEV Catalog in 2022. VulnCheck examines which vulnerabilities were added in 2022, who exploited them, and how long it took to add them to the Catalog.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2023-03-02T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Assessing Potential Exploitation of Grafana's CVE-2021-43798 for Initial Access Access - Blog - VulnCheck]]></title>
        <id>/blog/grafana-cve-2021-43798</id>
        <link href="https://www.vulncheck.com/blog/grafana-cve-2021-43798"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/grafana-cve-2021-43798/og.png" type="image/png"/>
        <updated>2023-02-21T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Examining previous exploits for Grafana's CVE-2021-43798 and looking for a path to establish initial access.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2023-02-21T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[A Different Payload for CVE-2022-47966]]></title>
        <id>/blog/cve-2022-47966-payload</id>
        <link href="https://www.vulncheck.com/blog/cve-2022-47966-payload"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/cve-2022-47966-payload/og.png" type="image/png"/>
        <updated>2023-02-14T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Exploring a memory resident payload for CVE-2022-47966.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2023-02-14T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Who to Trust? National Vulnerability Database CVSS Accuracy Issues - VulnCheck]]></title>
        <id>/blog/cvss-accuracy-issues</id>
        <link href="https://www.vulncheck.com/blog/cvss-accuracy-issues"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/cvss-accuracy-issues/og.png" type="image/png"/>
        <updated>2023-02-02T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[The National Vulnerability Database contains thousands of CVSS vectors. How accurate are those vectors and does accuracy matter?]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2023-02-02T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Assessing Potential Exploitation of Sophos Firewall and CVE-2022-3236 Blog - VulnCheck]]></title>
        <id>/blog/sophos-cve-2022-3236</id>
        <link href="https://www.vulncheck.com/blog/sophos-cve-2022-3236"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/sophos-cve-2022-3236/og.png" type="image/png"/>
        <updated>2023-01-13T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Sophos Firewalls were exploited using CVE-2022-3236 in September, 2022. Few details have been published about this vulnerability. In this blog, we look at log entries the exploit creates and determine how many vulnerable internet-facing firewalls still exist.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2023-01-13T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[GLPI Exploitation Timeline]]></title>
        <id>/blog/glpi-exploitation</id>
        <link href="https://www.vulncheck.com/blog/glpi-exploitation"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/glpi-exploitation/og.png" type="image/png"/>
        <updated>2022-12-21T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[Taking a look at the timeline leading up to exploitation of CVE-2022-35914 and the current state of attacks in the wild.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2022-12-21T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Moobot Uses a Fake Vulnerability]]></title>
        <id>/blog/moobot-uses-fake-vulnerability</id>
        <link href="https://www.vulncheck.com/blog/moobot-uses-fake-vulnerability"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/moobot-uses-fake-vulnerability/og.png" type="image/png"/>
        <updated>2022-12-06T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[An investigation into CVE-2022-28958 finds the vulnerability doesn't actually exist.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2022-12-06T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Xiongmai IoT Exploitation]]></title>
        <id>/blog/xiongmai-iot-exploitation</id>
        <link href="https://www.vulncheck.com/blog/xiongmai-iot-exploitation"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/xiongmai-iot-exploitation/og.png" type="image/png"/>
        <updated>2022-11-30T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[An examination of vulnerabilities affecting Xiongmai IoT devices, including exploit development and an analysis of exploitation in the wild.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2022-11-30T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Prioritizing CISA Known Exploited Vulnerabilities]]></title>
        <id>/blog/kev-prioritization</id>
        <link href="https://www.vulncheck.com/blog/kev-prioritization"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/kev-prioritization/og.png" type="image/png"/>
        <updated>2022-11-14T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[The CISA Known Exploited Vulnerabilities (KEV) Catalog tracks vulnerabilities that have been exploited in the wild, and it currently has more than 800 entries.]]></summary>
        <author>
            <name>Jacob Baines</name>
            <uri>https://twitter.com/Junior_Baines</uri>
        </author>
        <published>2022-11-14T00:00:00.000Z</published>
    </entry>
    <entry>
        <title type="html"><![CDATA[Website Launch]]></title>
        <id>/blog/website-launch</id>
        <link href="https://www.vulncheck.com/blog/website-launch"/>
        <link rel="enclosure" href="https://www.vulncheck.com/__og-image__/image/blog/website-launch/og.png" type="image/png"/>
        <updated>2022-11-12T00:00:00.000Z</updated>
        <summary type="html"><![CDATA[We've been around, supporting our customers since 2021, but only recently launched our website.]]></summary>
        <author>
            <name>Anthony Bettini</name>
        </author>
        <published>2022-11-12T00:00:00.000Z</published>
    </entry>
</feed>