Blog

Security Insights

Deep dives, expert analysis, and practical guidance on exposure management, adversarial validation, and the future of AI-driven security operations.

Exploiting Limited Markup Features on Web Applications
Application Security

Exploiting Limited Markup Features on Web Applications

Limited markup features. Big vulnerabilities? Web applications security might seem straightforward, but stripped-down code can create hidden weaknesses. Web applications that support limited markup in fields, such as comments, utilize a simplified version of markup languages to enable users to forma

Apr 8, 20247 min
Top 5 Vulnerabilities for March 2024: A Closer Look at the XZ Utils Supply Chain Attack
Vulnerability IntelligenceVulnerability Management

Top 5 Vulnerabilities for March 2024: A Closer Look at the XZ Utils Supply Chain Attack

March may have roared in like a lion, but for cybersecurity professionals, it was more like a backdoor sneaking into a critical utility. This month, we've seen some serious contenders, but one in particular has sent shockwaves through the open-source software (OSS) community: CVE-2024-3094, a sneaky

Apr 2, 20245 min
Prioritizing Vulnerabilities: A Growing Imperative
Vulnerability Prioritization

Prioritizing Vulnerabilities: A Growing Imperative

Did a security breach just become your biggest nightmare? It's a harsh reality for many companies. A whopping 76% of enterprise IT security executives reported business disruptions due to vulnerabilities in just the past year. Vulnerability scanners overwhelm you with thousands of vulnerabilities, l

Mar 29, 20244 min
Atlassian Patches Critical Bamboo Bug and Over 20 Other Vulnerabilities
Vulnerability Intelligence

Atlassian Patches Critical Bamboo Bug and Over 20 Other Vulnerabilities

Atlassian recently addressed a critical security flaw (CVE-2024-1597) impacting Bamboo Data Center and Server versions. This SQL injection vulnerability, discovered by SonarSource security researcher Paul Gerste, allows attackers to potentially compromise vulnerable systems without needing user inte

Mar 22, 20242 min
The Evolving Landscape of Security: From Vulnerability Management to CTEM
CTEM

The Evolving Landscape of Security: From Vulnerability Management to CTEM

Cyberattacks are growing more sophisticated by the day, especially with the advent of AI. Hackers are exploiting not just software flaws, but also misconfigurations, human error, and even unguarded cloud assets. Making the shift from Vulnerability Management To CTEM is crucial — traditional vulnerab

Mar 15, 20244 min
Why Ignoring Vulnerability Prioritization is a CISO's Worst Nightmare?
Vulnerability Management

Why Ignoring Vulnerability Prioritization is a CISO's Worst Nightmare?

As a CISO, you're constantly bombarded with security threats, vulnerabilities, and a never-ending to-do list. But amidst the chaos, one crucial task often gets pushed aside: vulnerability prioritization. This might seem like a harmless oversight, but ignoring it can be your worst nightmare. Here's w

Mar 7, 202410 min
Cloud Attack Surface Management(CASM): What is it? How does Strobes CASM help you with cloud security?
ASM

Cloud Attack Surface Management(CASM): What is it? How does Strobes CASM help you with cloud security?

The cloud revolutionized how businesses operate, but with increased flexibility comes an expanded attack surface. Traditional security methods struggle to keep pace with the dynamic nature of cloud environments, making Cloud Attack Surface Management (CASM) a crucial tool for modern security teams.

Mar 6, 20246 min
February 2024 Top CVEs and Vulnerabilities Report
Vulnerability IntelligenceVulnerability Management

February 2024 Top CVEs and Vulnerabilities Report

In February, hearts weren't the only things feeling vulnerable. The cyber arena saw a variety of critical exposures across multiple platforms and applications. While patching might not be as romantic as chocolates or roses, organizations and individuals alike must stay protected. Here, we highlight

Mar 1, 20243 min
Bridging the Gap: Connecting Cybersecurity Spending to Business Results
Cybersecurity

Bridging the Gap: Connecting Cybersecurity Spending to Business Results

Cybersecurity is no longer an optional expense; it's a strategic investment for businesses of all sizes. But securing budget approval for cybersecurity investments can be a hurdle, especially when justifying the return on investment (ROI). This blog tackles this challenge head-on, providing practica

Feb 27, 20244 min
What is Software Bill of Materials (SBOMs)?
Vulnerability Management

What is Software Bill of Materials (SBOMs)?

Software Bill of Materials (SBOMs) is rapidly emerging as a cornerstone for robust software supply chain security. Functioning as a comprehensive inventory of all software components, dependencies, and associated metadata, SBOMs empower organizations to gain unparalleled transparency into the intric

Feb 26, 20246 min
How to Check for Subdomain Takeover: A Step-by-Step Guide
ASM

How to Check for Subdomain Takeover: A Step-by-Step Guide

Subdomain takeovers pose a serious risk to businesses, as websites are the cornerstone of their online identity, driving brand awareness, customer engagement, and revenue. But what if, unknowingly, you've created a vulnerability that could expose your entire digital presence to attackers? Understand

Feb 12, 20247 min
RBVM Customized Dashboards: CFO Template
Vulnerability Management

RBVM Customized Dashboards: CFO Template

In the high-stakes arena of finance and cybersecurity, clarity is critical. Every data point holds the potential to shape your company's destiny. But raw numbers alone tell only half the story. Introducing Strobes next-generation CFO Dashboards for Risk-Based Vulnerability Management, where data tra

Feb 6, 20243 min