<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | CERT/CC Vulnerabilities</title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching CERT/CC Vulnerabilities</description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/certcc/atom/" rel="self"/><language>en-us</language><lastBuildDate>Wed, 26 Mar 2025 00:00:00 -0400</lastBuildDate><item><title>The Essential Role of AISIRT in Flaw and Vulnerability Management</title><link>https://www.sei.cmu.edu/blog/the-essential-role-of-aisirt-in-flaw-and-vulnerability-management/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The SEI established the first Artificial Intelligence Security Incident Response Team (AISIRT) in 2023. This post discusses the role of AISIRT in coordinating flaws and vulnerabilities in AI systems.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Lauren McIlvenny, Vijay Sarvepalli</dc:creator><pubDate>Wed, 26 Mar 2025 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-essential-role-of-aisirt-in-flaw-and-vulnerability-management/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>CERT/CC Vulnerabilities</category><category>Cybersecurity</category><category>AISIRT</category></item><item><title>Protecting AI from the Outside In: The Case for Coordinated Vulnerability Disclosure</title><link>https://www.sei.cmu.edu/blog/protecting-ai-from-the-outside-in-the-case-for-coordinated-vulnerability-disclosure/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post highlights lessons learned from applying the coordinated vulnerability disclosure (CVD) process to reported vulnerabilities in AI and ML systems.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Allen Householder, Vijay Sarvepalli, Jeff Havrilla, Matt Churilla, Lena Pons, Shing-hon Lau, Nathan VanHoudnos, Andrew Kompanek, Lauren McIlvenny</dc:creator><pubDate>Mon, 24 Feb 2025 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/protecting-ai-from-the-outside-in-the-case-for-coordinated-vulnerability-disclosure/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>CERT/CC Vulnerabilities</category><category>Artificial Intelligence Engineering</category><category>Securing AI</category></item><item><title>Vulnerabilities: Everybody’s Got One!</title><link>https://www.sei.cmu.edu/blog/vulnerabilities-everybodys-got-one/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In this post, Leigh Metcalf describes how she pulled data from the malvuln project to explore recent vulnerabilities in both malware and non-malware to study the differences.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Leigh Metcalf</dc:creator><pubDate>Wed, 16 Jun 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/vulnerabilities-everybodys-got-one/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>CERT/CC Vulnerabilities</category><category>Vulnerability Analysis</category><category>Malware Analysis</category><category>Malware</category></item><item><title>ACM Digital Threats:  Research and Practice</title><link>https://www.sei.cmu.edu/blog/acm-digital-threats-research-and-practice/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>CERT/CC is very excited to announce a new journal in collaboration with ACM called ACM Digital Threats, Research and Practice. The journal (DTRAP) is a peer-reviewed journal....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Leigh Metcalf</dc:creator><pubDate>Wed, 18 Apr 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/acm-digital-threats-research-and-practice/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>CERT/CC Vulnerabilities</category></item><item><title>CVD Series: What is Coordinated Vulnerability Disclosure? (Part 1 of 9)</title><link>https://www.sei.cmu.edu/blog/cvd-series-what-is-coordinated-vulnerability-disclosure-part-1-of-9/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This is the first post in a series about Coordinated Vulnerability Disclosure (CVD). In this series, we will discuss why CVD is an important part of the modern software development lifecycle, and how individuals and organizations can establish a CVD process.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Garret Wassermann</dc:creator><pubDate>Tue, 27 Sep 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/cvd-series-what-is-coordinated-vulnerability-disclosure-part-1-of-9/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>CERT/CC Vulnerabilities</category><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Best Practices</category></item><item><title>The Report "Network Profiling Using Flow" Released</title><link>https://www.sei.cmu.edu/blog/the-report-network-profiling-using-flow-released/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Hi, this is Austin Whisnant of the CERT Network Situational Awareness Team (NetSA). After a long time in the making, NetSA has published an SEI technical report on how to inventory assets....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Austin Whisnant</dc:creator><pubDate>Wed, 05 Sep 2012 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-report-network-profiling-using-flow-released/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>Network Situational Awareness</category><category>CERT/CC Vulnerabilities</category></item></channel></rss>