Blog

Security Insights

Deep dives, expert analysis, and practical guidance on exposure management, adversarial validation, and the future of AI-driven exposure management.

OpenSSH regreSSHion (CVE-2024-6387): A Blast from the Past with Critical Repercussions
CVE

OpenSSH regreSSHion (CVE-2024-6387): A Blast from the Past with Critical Repercussions

OpenSSH, a crucial tool in secure communications, has recently been impacted by a critical vulnerability identified as CVE-2024-6387, also known as "regreSSHion." This blog will provide an overview of the vulnerability, its exploitation methods, and strategies for mitigation. OpenSSH (Open Secure Sh

Jul 2, 20246 min
CTEM (Continuous Threat Exposure Management) - The Ultimate Guide for CISOs
CTEM

CTEM (Continuous Threat Exposure Management) - The Ultimate Guide for CISOs

Cybersecurity defenses have evolved from firewalls to red teaming, yet breaches still make headlines. Why? Because piecemeal security strategies leave blind spots. This is where Continuous Threat Exposure Management (CTEM) changes the game. Instead of reacting after an attack, CTEM delivers ongoing

May 27, 202419 min
Open Source Security: How Strobes Integrates Security into Your Dev Workflow
Cloud Security

Open Source Security: How Strobes Integrates Security into Your Dev Workflow

Cloud-native development thrives on open source software (OSS). It offers readily available, pre-built components that accelerate development lifecycles. However, this very advantage presents a significant Open Source Security challenge for DevSecOps: OSS security vulnerabilities. A single critical

May 8, 20247 min
Penetration Testing Report: Key Elements You Can't Miss
Penetration Testing

Penetration Testing Report: Key Elements You Can't Miss

You've invested in a Penetration Testing Report. Great news! You've taken a crucial step towards shoring up your organization's security. But the battle isn't over yet. That hefty penetration testing report you just received holds the key to unlocking the true value of the pentest. The question is,

Apr 30, 202413 min
Prioritizing Vulnerabilities: A Growing Imperative
Vulnerability Prioritization

Prioritizing Vulnerabilities: A Growing Imperative

Did a security breach just become your biggest nightmare? It's a harsh reality for many companies. A whopping 76% of enterprise IT security executives reported business disruptions due to vulnerabilities in just the past year. Vulnerability scanners overwhelm you with thousands of vulnerabilities, l

Mar 29, 20244 min
The Evolving Landscape of Security: From Vulnerability Management to CTEM
CTEM

The Evolving Landscape of Security: From Vulnerability Management to CTEM

Cyberattacks are growing more sophisticated by the day, especially with the advent of AI. Hackers are exploiting not just software flaws, but also misconfigurations, human error, and even unguarded cloud assets. Making the shift from Vulnerability Management To CTEM is crucial — traditional vulnerab

Mar 15, 20244 min
Cloud Attack Surface Management(CASM): What is it? How does Strobes CASM help you with cloud security?
ASM

Cloud Attack Surface Management(CASM): What is it? How does Strobes CASM help you with cloud security?

The cloud revolutionized how businesses operate, but with increased flexibility comes an expanded attack surface. Traditional security methods struggle to keep pace with the dynamic nature of cloud environments, making Cloud Attack Surface Management (CASM) a crucial tool for modern security teams.

Mar 6, 20246 min
Bridging the Gap: Connecting Cybersecurity Spending to Business Results
Cybersecurity

Bridging the Gap: Connecting Cybersecurity Spending to Business Results

Cybersecurity is no longer an optional expense; it's a strategic investment for businesses of all sizes. But securing budget approval for cybersecurity investments can be a hurdle, especially when justifying the return on investment (ROI). This blog tackles this challenge head-on, providing practica

Feb 27, 20244 min
RBVM Customized Dashboards: CFO Template
Vulnerability Management

RBVM Customized Dashboards: CFO Template

In the high-stakes arena of finance and cybersecurity, clarity is critical. Every data point holds the potential to shape your company's destiny. But raw numbers alone tell only half the story. Introducing Strobes next-generation CFO Dashboards for Risk-Based Vulnerability Management, where data tra

Feb 6, 20243 min
Offensive Security 101: Everything You Need to Know
Offensive Security

Offensive Security 101: Everything You Need to Know

For most, the term "offensive" evokes images of aggression and harm. But in cybersecurity, offensive security takes on a whole new meaning: proactive, strategic, and ultimately, robust security. That's the essence of offensive security, a practice that's rapidly evolving from a niche expertise to a

Jan 17, 20249 min
Use Case: Rapid Identification and Escalation of a Critical Threat by Strobes ASM
ASM

Use Case: Rapid Identification and Escalation of a Critical Threat by Strobes ASM

Introduction In a recent critical incident, Strobes ASM, an attack surface management platform, played a key role in identifying and mitigating a severe threat in a custom-made WordPress application. The application was designed to require authentication for access, but due to a misconfiguration in

Jan 9, 20242 min
Strobes Custom Dashboards: Redefining Risk-Based Vulnerability Management
RBVM

Strobes Custom Dashboards: Redefining Risk-Based Vulnerability Management

Say goodbye to generic dashboards and hello to customized vulnerability insights! Strobes' new custom vulnerability management dashboard feature injects a potent dose of personalization into your RBVM strategy. Let’s dive into the nitty-gritty of this feature and uncover how it revolutionizes the wa

Jan 2, 20243 min