<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Security Vulnerabilities</title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Security Vulnerabilities</description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/security-vulnerabilities/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 26 Jun 2023 00:00:00 -0400</lastBuildDate><item><title>UEFI: 5 Recommendations for Securing and Restoring Trust</title><link>https://www.sei.cmu.edu/blog/uefi-5-recommendations-for-securing-restoring-trust/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post expands on concerns brought to light from recent UEFI attacks, such as BlackLotus, and highlights 5 recommendations to secure and restore trust in the UEFI ecosystem.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Vijay Sarvepalli</dc:creator><pubDate>Mon, 26 Jun 2023 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/uefi-5-recommendations-for-securing-restoring-trust/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>CERT/CC</category></item><item><title>Vultron: A Protocol for Coordinated Vulnerability Disclosure</title><link>https://www.sei.cmu.edu/blog/vultron-a-protocol-for-coordinated-vulnerability-disclosure/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post introduces Vultron, a protocol for multi-party coordinated vulnerability disclosure (MPCVD).</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Allen Householder</dc:creator><pubDate>Mon, 26 Sep 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/vultron-a-protocol-for-coordinated-vulnerability-disclosure/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>CERT/CC</category></item><item><title>UEFI – Terra Firma for Attackers</title><link>https://www.sei.cmu.edu/blog/uefi-terra-firma-for-attackers/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post focuses on how the vulnerabilities in firmware popularized by the Uniform Extensible Firmware Interface create a lucrative target for high-profile attackers.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Vijay Sarvepalli</dc:creator><pubDate>Mon, 01 Aug 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/uefi-terra-firma-for-attackers/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>CERT/CC</category></item><item><title>Probably Don’t Rely on EPSS Yet</title><link>https://www.sei.cmu.edu/blog/probably-dont-rely-on-epss-yet/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post evaluates the pros and cons of the Exploit Prediction Scoring System (EPSS), a data-driven model designed to estimate the probability that software vulnerabilities will be exploited in practice.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jonathan Spring</dc:creator><pubDate>Mon, 06 Jun 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/probably-dont-rely-on-epss-yet/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>CERT/CC</category></item><item><title>How Easy Is It to Make and Detect a Deepfake?</title><link>https://www.sei.cmu.edu/blog/how-easy-is-it-to-make-and-detect-a-deepfake/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The technology underlying the creation and detection of deepfakes and assessment of current and future threat levels</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Catherine Bernaciak, Dominic Ross</dc:creator><pubDate>Mon, 14 Mar 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/how-easy-is-it-to-make-and-detect-a-deepfake/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>Vulnerability Mitigation</category><category>Security-Related Requirements</category><category>Artificial Intelligence Engineering</category><category>Advanced Computing</category></item><item><title>The Latest Work from the SEI: Coordinated Vulnerability Disclosure, Cybersecurity Research, Cyber Risk and Resilience, and the Importance of Fostering Diversity in Software Engineering</title><link>https://www.sei.cmu.edu/blog/the-latest-work-from-the-sei-coordinated-vulnerability-disclosure-cybersecurity-research-cyber-risk-and-resilience-and-the-importance-of-fostering-diversity-in-software-engineering/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post highlights the latest work from the SEI in coordinated vulnerability disclosure, cyber risk and resilience management, automation, and the science of cybersecurity.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 06 Sep 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-latest-work-from-the-sei-coordinated-vulnerability-disclosure-cybersecurity-research-cyber-risk-and-resilience-and-the-importance-of-fostering-diversity-in-software-engineering/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>CERT/CC</category></item><item><title>CERT/CC Comments on Standards and Guidelines to Enhance Software Supply Chain Security</title><link>https://www.sei.cmu.edu/blog/certcc-comments-on-standards-and-guidelines-to-enhance-software-supply-chain-security/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post shares insights from the CERT Coordination Center (CERT/CC) on proposed software supply chain security standards and guidelines.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jonathan Spring</dc:creator><pubDate>Tue, 01 Jun 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/certcc-comments-on-standards-and-guidelines-to-enhance-software-supply-chain-security/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>CERT/CC</category></item><item><title>Cat and Mouse in the Age of .NET</title><link>https://www.sei.cmu.edu/blog/cat-and-mouse-age-net/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post explores evolving .NET threat landscape with challenges faced by red and blue teams and suggests ways to stay ahead of attackers.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Brandon Marzik</dc:creator><pubDate>Thu, 19 Nov 2020 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/cat-and-mouse-age-net/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>CERT/CC</category><category>Cybersecurity</category><category>Best Practices in Network Security</category></item><item><title>Adversarial ML Threat Matrix: Adversarial Tactics, Techniques, and Common Knowledge of Machine Learning</title><link>https://www.sei.cmu.edu/blog/adversarial-ml-threat-matrix-adversarial-tactics-techniques-and-common-knowledge-of-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post introduces the Adversarial ML Threat Matrix, a list of tactics to exploit machine learning models, and guidance on defense against them.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jonathan Spring</dc:creator><pubDate>Thu, 22 Oct 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/adversarial-ml-threat-matrix-adversarial-tactics-techniques-and-common-knowledge-of-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Mitigation</category><category>Security Vulnerabilities</category><category>CERT/CC</category><category>Autonomy and Counter-Autonomy</category></item><item><title>Three Places to Start in Defending Against Ransomware</title><link>https://www.sei.cmu.edu/blog/three-places-to-start-in-defending-against-ransomware/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Learn three initial efforts for defending against ransomware in this informative SEI Blog post.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Timothy Shimeall</dc:creator><pubDate>Mon, 12 Oct 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/three-places-to-start-in-defending-against-ransomware/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>Ransomware</category><category>CERT/CC</category></item><item><title>Ransomware as a Service (RaaS) Threats</title><link>https://www.sei.cmu.edu/blog/ransomware-as-a-service-raas-threats/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post explores the economics behind why ransomware remains a top tool for cybercrime and presents the current active ransomware variants that utilize ransomware as a service (RaaS), a change in the ransomware business model that could lead to a significant upswing in ransomware activity.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Marisa Midler</dc:creator><pubDate>Mon, 05 Oct 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/ransomware-as-a-service-raas-threats/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>Ransomware</category><category>CERT/CC</category></item><item><title>Snake Ransomware Analysis Updates</title><link>https://www.sei.cmu.edu/blog/snake-ransomware-analysis-updates/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In January 2020, Sentinel Labs published two reports on Snake (also known as Ekans) ransomware.[1][2] The Snake ransomware gained attention due to its ability to terminate specific industrial control system (ICS) processes....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Kyle O'Meara</dc:creator><pubDate>Mon, 23 Mar 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/snake-ransomware-analysis-updates/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Malware Analysis</category><category>Security Vulnerabilities</category><category>CERT/CC</category></item><item><title>Bridging the Gap Between Research and Practice</title><link>https://www.sei.cmu.edu/blog/bridging-the-gap-between-research-and-practice/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>A fundamental goal for a federally funded research and development center (FFRDC) is to bridge the gap between research and practice for government customers....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Leigh Metcalf</dc:creator><pubDate>Mon, 23 Mar 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/bridging-the-gap-between-research-and-practice/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>CERT/CC</category></item><item><title>Security Automation Begins at the Source Code</title><link>https://www.sei.cmu.edu/blog/security-automation-begins-at-the-source-code/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Hi, this is Vijay Sarvepalli, Information Security Architect in the CERT Division. On what seemed like a normal day at our vulnerability coordination center, one of my colleagues asked me....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Vijay Sarvepalli</dc:creator><pubDate>Wed, 11 Mar 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/security-automation-begins-at-the-source-code/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>Vulnerability Mitigation</category><category>CERT/CC</category></item><item><title>Comments on NIST IR 8269: A Taxonomy and Terminology of Adversarial Machine Learning</title><link>https://www.sei.cmu.edu/blog/comments-on-nist-ir-8269-a-taxonomy-and-terminology-of-adversarial-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The U.S. National Institute of Standards and Technology (NIST) recently held a public comment period on their draft report on proposed taxonomy and terminology of Adversarial Machine Learning (AML)....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jonathan Spring</dc:creator><pubDate>Thu, 13 Feb 2020 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/comments-on-nist-ir-8269-a-taxonomy-and-terminology-of-adversarial-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>CERT/CC</category><category>Autonomy and Counter-Autonomy</category><category>Software and Information Assurance</category><category>System Verification and Validation</category><category>Mission Assurance</category></item><item><title>Prioritizing Vulnerability Response with a Stakeholder-Specific Vulnerability Categorization</title><link>https://www.sei.cmu.edu/blog/prioritizing-vulnerability-response-with-a-stakeholder-specific-vulnerability-categorization/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>We've just released a follow-up paper in our research agenda about prioritizing actions during vulnerability management, Prioritizing Vulnerability Response: A Stakeholder-Specific Vulnerability Categorization....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Allen Householder</dc:creator><pubDate>Thu, 05 Dec 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/prioritizing-vulnerability-response-with-a-stakeholder-specific-vulnerability-categorization/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Vulnerability Mitigation</category><category>CERT/CC</category><category>Software and Information Assurance</category></item><item><title>VPN - A Gateway for Vulnerabilities</title><link>https://www.sei.cmu.edu/blog/vpn-a-gateway-for-vulnerabilities/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Virtual Private Networks (VPNs) are the backbone of today's businesses providing a wide range of entities from remote employees to business partners and...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Vijay Sarvepalli</dc:creator><pubDate>Wed, 13 Nov 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/vpn-a-gateway-for-vulnerabilities/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>Vulnerability Mitigation</category><category>CERT/CC</category></item><item><title>It's Time to Retire Your Unsupported Things</title><link>https://www.sei.cmu.edu/blog/its-time-to-retire-your-unsupported-things/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>"If it ain't broke, don't fix it." Why mess with something that already works? This is fair advice with many things in life. But when it comes to software security, it's important to....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Dormann</dc:creator><pubDate>Wed, 23 Oct 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/its-time-to-retire-your-unsupported-things/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Mitigation</category><category>Security Vulnerabilities</category><category>CERT/CC</category><category>Best Practices</category></item><item><title>Update on the CERT Guide to Coordinated Vulnerability Disclosure</title><link>https://www.sei.cmu.edu/blog/update-on-the-cert-guide-to-coordinated-vulnerability-disclosure/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>It's been two years since we originally published the CERT Guide to Coordinated Vulnerability Disclosure. In that time, it's influenced both the US Congress and EU Parliament....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Allen Householder</dc:creator><pubDate>Mon, 16 Sep 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/update-on-the-cert-guide-to-coordinated-vulnerability-disclosure/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>Vulnerability Mitigation</category><category>CERT/CC</category><category>Best Practices</category></item><item><title>The Dangers of VHD and VHDX Files</title><link>https://www.sei.cmu.edu/blog/the-dangers-of-vhd-and-vhdx-files/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Recently, I gave a presentation at BSidesPGH 2019 called Death By Thumb Drive: File System Fuzzing with CERT BFF....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Dormann</dc:creator><pubDate>Wed, 04 Sep 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-dangers-of-vhd-and-vhdx-files/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>Vulnerability Mitigation</category><category>CERT/CC</category></item></channel></rss>