Robuta

https://www.datadoghq.com/fr/specific_interest/vulnerability-detection/
vulnerability detectiondatadog
https://wazuh.com/resources/use-cases/vulnerability-detection/
Apr 4, 2025 - Leverage the Wazuh Open Source vulnerability detection capability to proactively identify and remedy vulnerabilities, therefore reducing the risk of successful...
vulnerability detectionidentifyremedyvulnerabilitieswazuh
https://www.tenable.com/blog/tenable-facilitates-detection-of-openssl-vulnerability-using-nessus-and-nessus-perimeter
Facilitate easy detection of the OpenSSL Heartbeat vulnerability in your enterprise Note: Passive Vulnerability Scanner (PVS) is now Nessus Network Monitor. To...
tenabledetectionopensslvulnerabilityusing
https://securityboulevard.com/2022/12/log4j-vulnerability-detection-one-year-after-log4shell-firms-still-struggle-to-hunt-down-log4j-contrast-security/
Dec 8, 2022 - It’s been one year since a CVE identifier was made available for the infamous Log4j flaw — CVE-2021-44228, commonly referred to as Log4Shell — on Dec....
vulnerability detectionone yearfirmsstillstruggle
https://www.sysdig.com/es/blog/cve-2023-38545
CVE-2023-38545 is a SOCKS5 heap buffer overflow. This flaw makes curl overflow a heap-based buffer in the SOCKS5 proxy handshake.
vulnerability detectioncvehighseveritycurl
https://www.cybersecuritydive.com/news/ai-vulnerability-detection-patching-threats-mandiant-summit/760746/
Patching won’t be able to keep up with discovery, said Rob Joyce, who once led the National Security Agency's elite hacking team.
ai poweredvulnerability detectionmake thingsworsebetter
https://www.darktrace.com/fr/blog/detecting-and-responding-to-log4shell-in-the-wild
Learn how Darktrace's AI detects and responds to Log4Shell attacks. Explore real-world examples and see how Darktrace identified and mitigated cyber threats.
vulnerability detectionresponsedarktrace
https://openreview.net/forum?id=FDzo9QjFeD&referrer=%5Bthe%20profile%20of%20Yufan%20Zhuang%5D(%2Fprofile%3Fid%3D~Yufan_Zhuang1)
Machine Learning-based modeling of source code understanding tasks has been gaining popularity. Accompanying their rapid proliferation is an emerging scrutiny...
code vulnerabilitydetectionviasignalaware
https://www.upguard.com/releases/additional-vulnerability-detection
Learn about UpGuard's latest release - featuring additional vulnerabilities detection
vulnerability detectionadditionalupguardreleases
https://www.sysdig.com/fr/blog/cve-2023-38545
CVE-2023-38545 is a SOCKS5 heap buffer overflow. This flaw makes curl overflow a heap-based buffer in the SOCKS5 proxy handshake.
vulnerability detectioncvehighseveritycurl
https://www.sysdig.com/it/blog/cve-2023-38545
CVE-2023-38545 is a SOCKS5 heap buffer overflow. This flaw makes curl overflow a heap-based buffer in the SOCKS5 proxy handshake.
vulnerability detectioncvehighseveritycurl
https://www.armyrecognition.com/archives/archives-land-defense/land-defense-2021/dsei-2021-census-labs-continue-to-protect-end-users-with-vulnerability-detection
CENSUS is an independent, privately funded company dedicated to providing highly specialized and professional IT security services. It was founded in 2008
end usersdseicensuslabscontinue
https://www.sysdig.com/it/blog/library-based-vulnerability-detection
With an ever-growing number of vulnerabilities, there's still significant room for improvement in vulnerability detection.
vulnerability detectionpowerlibrarybasedsysdig
https://www.mdpi.com/2071-1050/10/5/1652
As hacking techniques become more sophisticated, vulnerabilities have been gradually increasing.
vulnerability detectionsoftware securityautomatedremediationmethod
https://dast.oversecured.com/
DAST & SAST vulnerability detection for mobile apps
vulnerability detectionmobile appsdastsast
https://www.exabeam.com/blog/incident-response/7-detection-tips-for-the-log4j2-vulnerability/
Dec 6, 2023 - The Apache Log4j2 vulnerability CVE-2021-44228, disclosed on December 9, 2021, allows for remote code execution against users. This vulnerability is actively...
detectiontipsvulnerabilityexabeam