Robuta

https://www.mdpi.com/2071-1050/15/10/7957
The issue of spatial equity of Nature-Based Solutions in cities generally concerns the spatial distribution of their benefits to local residents and other city...
spatial analysisfloodexposurevulnerabilityplanning
https://www.wfp.org/publications/wfp-jordan-mobile-vulnerability-analysis-and-mapping-interactive-dashboard
mVAM is WFP’s mobile Vulnerability Analysis and Mapping project that uses mobile technology to remotely monitor household food security and nutrition, and...
vulnerability analysiswfpjordanmobilemapping
https://securitybridge.com/products/code-vulnerability-analysis/
Sep 22, 2025 - SAP Certified - Innovative and fast SAP code security scan detects ABAP code vulnerabilities in real-time.
vulnerability analysiscode
https://pwning.tech/nftables/
A tale about exploiting KernelCTF Mitigation, Debian, and Ubuntu instances with a double-free in nf_tables in the Linux kernel, using novel techniques like...
a newflippingpagesanalysislinux
https://atos.net/en/lp/cybershield/detailed-analysis-of-the-zero-day-vulnerability-in-moveit-transfer
zero day vulnerabilitydetailedanalysismoveittransfer
https://securelist.com/vulnerabilities-and-exploits-in-q2-2025/117333/
Aug 27, 2025 - This report provides statistical data on published vulnerabilities and exploits we researched in Q2 2025. It also includes summary data on the use of C2...
vulnerabilitylandscapeanalysissecurelist
https://blackduck.skilljar.com/black-duck-binary-analysis-vulnerability-triage
This course is a quick walkthrough on how to triage vulnerabilities in BDBA.
black duckbinaryanalysisvulnerabilitytriage
https://www.prnewswire.com/news-releases/cyrebro-analysis-vulnerability-exploitation-is-the-top-threat-to-smbs-301474731.html
/PRNewswire/ -- CYREBRO, the developers of the first online, technology-agnostic Security Operations Center (SOC) Platform, unveiled research revealing that...
the topanalysisvulnerabilityexploitationthreat
https://rdosregionalconnections.ca/hazard-risk-and-vulnerability-analysis-hrva
The RDOS is partnering with municipalities, syilx Okanagan communities, and Electoral Areas to complete a Hazard, Risk and Vulnerability Analysis (HRVA).
vulnerability analysishazardriskrdosregional
https://pwning.tech/nftables/?utm_campaign=KubeWeekly&utm_source=hs_email&utm_medium=email&_hsenc=p2ANqtz-_btrr2VG744Wn6sB-z71HI70JKnGLb7lJSvJCB09JLPKsj1a1YO9Wt_LnUWTMYhxdK5Oau
A tale about exploiting KernelCTF Mitigation, Debian, and Ubuntu instances with a double-free in nf_tables in the Linux kernel, using novel techniques like...
a newflippingpagesanalysislinux
https://blackduck.skilljar.com/black-duck-binary-analysis-how-to-create-a-vendor-vulnerability
BDBA offers the ability to add custom vulnerabilities to both proprietary and OSS components, and this course shows how to create them.
how to createblack duckbinaryanalysisvendor
https://www.easychair.org/publications/preprint/gpm7
vulnerability analysismetro networkstopologyseveralurban
https://www.kth.se/cdis/forskning/sarbarheter-och-hotanalys-fran-sidokanaler-med-maskininlarning-i-fokus-1.1316745
For the past decade, cyber attacks have moved from high up in the software stack to the underlying physical implementation, the hardware. Despite growing...
side channelthreat analysismachine learningvulnerability
https://github.com/presidentbeef/brakeman
A static analysis security vulnerability scanner for Ruby on Rails applications - presidentbeef/brakeman
static analysissecurity vulnerabilitygithubbrakemanscanner
https://securelist.com/vulnerabilities-and-exploits-in-q1-2025/116624/
Oct 2, 2025 - This report contains statistics on vulnerabilities and published exploits, along with an analysis of the most noteworthy vulnerabilities we observed in the...
vulnerabilitylandscapeanalysissecurelist
https://securelist.com/vulnerabilities-and-exploits-in-q4-2024/115761/
Feb 26, 2025 - This report provides statistics on vulnerabilities and exploits and discusses the most frequently exploited vulnerabilities in Q4 2024.
vulnerabilitylandscapeanalysissecurelist