<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Vulnerability Analysis</title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Vulnerability Analysis</description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/vulnerability-analysis/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 19 Sep 2022 00:00:00 -0400</lastBuildDate><item><title>Using Alternate Data Streams in the Collection and Exfiltration of Data</title><link>https://www.sei.cmu.edu/blog/using-alternate-data-streams-in-the-collection-and-exfiltration-of-data/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In this blog post, we describe how attackers obscure their activity via alternate data streams (ADSs) and how to defend against malware attacks that employ ADSs.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dustin Updyke, Molly Jaconski</dc:creator><pubDate>Mon, 19 Sep 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/using-alternate-data-streams-in-the-collection-and-exfiltration-of-data/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Vulnerability Discovery</category><category>Vulnerability Mitigation</category><category>Malware Analysis</category><category>Malware</category></item><item><title>Six Dimensions of Trust in Autonomous Systems</title><link>https://www.sei.cmu.edu/blog/six-dimensions-of-trust-in-autonomous-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post chronicles the adoption and growth of autonomous systems and provides six considerations for establishing trust.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Paul Nielsen</dc:creator><pubDate>Wed, 20 Apr 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/six-dimensions-of-trust-in-autonomous-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Software Assurance</category><category>Vulnerability Discovery</category><category>Devops</category><category>Artificial Intelligence Engineering</category><category>Machine Learning</category><category>Cybersecurity</category><category>Autonomy and Counter-Autonomy</category><category>Software and Information Assurance</category><category>Human-Machine Interactions</category><category>Artificial Intelligence</category><category>Digital Engineering</category><category>Cyber-Physical Systems</category></item><item><title>Vulnerabilities: Everybody’s Got One!</title><link>https://www.sei.cmu.edu/blog/vulnerabilities-everybodys-got-one/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In this post, Leigh Metcalf describes how she pulled data from the malvuln project to explore recent vulnerabilities in both malware and non-malware to study the differences.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Leigh Metcalf</dc:creator><pubDate>Wed, 16 Jun 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/vulnerabilities-everybodys-got-one/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>CERT/CC Vulnerabilities</category><category>Vulnerability Analysis</category><category>Malware Analysis</category><category>Malware</category></item><item><title>The Latest Work from the SEI: Privacy, Ransomware, Digital Engineering, and the Solar Winds Hack</title><link>https://www.sei.cmu.edu/blog/the-latest-work-from-the-sei-privacy-ransomware-digital-engineering-and-the-solar-winds-hack/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>These publications highlight the latest work of SEI technologists in software architecture, digital engineering, and ransomware.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 05 Apr 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-latest-work-from-the-sei-privacy-ransomware-digital-engineering-and-the-solar-winds-hack/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Architecture</category><category>Vulnerability Analysis</category></item><item><title>Security Automation Begins at the Source Code</title><link>https://www.sei.cmu.edu/blog/security-automation-begins-at-the-source-code/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Hi, this is Vijay Sarvepalli, Information Security Architect in the CERT Division. On what seemed like a normal day at our vulnerability coordination center, one of my colleagues asked me....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Vijay Sarvepalli</dc:creator><pubDate>Wed, 11 Mar 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/security-automation-begins-at-the-source-code/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>Vulnerability Mitigation</category><category>CERT/CC</category></item><item><title>Prioritizing Vulnerability Response with a Stakeholder-Specific Vulnerability Categorization</title><link>https://www.sei.cmu.edu/blog/prioritizing-vulnerability-response-with-a-stakeholder-specific-vulnerability-categorization/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>We've just released a follow-up paper in our research agenda about prioritizing actions during vulnerability management, Prioritizing Vulnerability Response: A Stakeholder-Specific Vulnerability Categorization....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Allen Householder</dc:creator><pubDate>Thu, 05 Dec 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/prioritizing-vulnerability-response-with-a-stakeholder-specific-vulnerability-categorization/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Vulnerability Mitigation</category><category>CERT/CC</category><category>Software and Information Assurance</category></item><item><title>VPN - A Gateway for Vulnerabilities</title><link>https://www.sei.cmu.edu/blog/vpn-a-gateway-for-vulnerabilities/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Virtual Private Networks (VPNs) are the backbone of today's businesses providing a wide range of entities from remote employees to business partners and...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Vijay Sarvepalli</dc:creator><pubDate>Wed, 13 Nov 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/vpn-a-gateway-for-vulnerabilities/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>Vulnerability Mitigation</category><category>CERT/CC</category></item><item><title>Update on the CERT Guide to Coordinated Vulnerability Disclosure</title><link>https://www.sei.cmu.edu/blog/update-on-the-cert-guide-to-coordinated-vulnerability-disclosure/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>It's been two years since we originally published the CERT Guide to Coordinated Vulnerability Disclosure. In that time, it's influenced both the US Congress and EU Parliament....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Allen Householder</dc:creator><pubDate>Mon, 16 Sep 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/update-on-the-cert-guide-to-coordinated-vulnerability-disclosure/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>Vulnerability Mitigation</category><category>CERT/CC</category><category>Best Practices</category></item><item><title>The Dangers of VHD and VHDX Files</title><link>https://www.sei.cmu.edu/blog/the-dangers-of-vhd-and-vhdx-files/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Recently, I gave a presentation at BSidesPGH 2019 called Death By Thumb Drive: File System Fuzzing with CERT BFF....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Dormann</dc:creator><pubDate>Wed, 04 Sep 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-dangers-of-vhd-and-vhdx-files/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>Vulnerability Mitigation</category><category>CERT/CC</category></item><item><title>Comments on Voluntary Voting System Guidelines 2.0 Principles and Guidelines</title><link>https://www.sei.cmu.edu/blog/comments-on-voluntary-voting-system-guidelines-20-principles-and-guidelines/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The U.S. Election Assistance Commission recently held a public comment period on their Voluntary Voting System Guidelines 2.0 Principles and Guidelines....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Allen Householder, Deana Shick, Jonathan Spring, Art Manion</dc:creator><pubDate>Fri, 14 Jun 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/comments-on-voluntary-voting-system-guidelines-20-principles-and-guidelines/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>CERT/CC</category><category>Software and Information Assurance</category><category>Best Practices</category></item><item><title>Evaluating Threat-Modeling Methods for Cyber-Physical Systems</title><link>https://www.sei.cmu.edu/blog/evaluating-threat-modeling-methods-for-cyber-physical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Addressing cybersecurity for a complex system, especially for a cyber-physical system of systems (CPSoS), requires a strategic approach during the entire lifecycle of the system....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nataliya Shevchenko</dc:creator><pubDate>Mon, 04 Feb 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/evaluating-threat-modeling-methods-for-cyber-physical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security-Related Requirements</category><category>OCTAVE</category><category>Cyber Risk and Resilience Management</category><category>Network Situational Awareness</category><category>Enterprise Risk and Resilience Management</category><category>Cyber Missions</category><category>Threat Modeling </category><category>Best Practices in Network Security</category><category>Risk</category><category>Cyber-Physical Systems</category><category>Critical Infrastructure Protection</category></item><item><title>Threat Modeling: 12 Available Methods</title><link>https://www.sei.cmu.edu/blog/threat-modeling-12-available-methods/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Almost all software systems today face a variety of threats, and the number of threats grows as technology changes....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nataliya Shevchenko</dc:creator><pubDate>Mon, 03 Dec 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/threat-modeling-12-available-methods/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security-Related Requirements</category><category>OCTAVE</category><category>Cyber Risk and Resilience Management</category><category>Network Situational Awareness</category><category>Enterprise Risk and Resilience Management</category><category>Cyber Missions</category><category>Threat Modeling </category><category>Best Practices in Network Security</category><category>Risk</category><category>Cyber-Physical Systems</category><category>Critical Infrastructure Protection</category></item><item><title>Decision-Making Factors for Selecting Application Security Testing Tools</title><link>https://www.sei.cmu.edu/blog/decision-making-factors-for-selecting-application-security-testing-tools/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In the first post in this series, I presented 10 types of application security testing (AST) tools and discussed when and how to use them....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Tom Scanlon</dc:creator><pubDate>Mon, 20 Aug 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/decision-making-factors-for-selecting-application-security-testing-tools/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber Missions</category><category>Cybersecurity</category><category>Secure Coding</category><category>Security-Related Requirements</category><category>Software and Information Assurance</category><category>Testing</category><category>Vulnerability Analysis</category><category>Secure Development</category></item><item><title>10 Types of Application Security Testing Tools: When and How to Use Them</title><link>https://www.sei.cmu.edu/blog/10-types-of-application-security-testing-tools-when-and-how-to-use-them/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post categorizes different types of application security testing tools and provides guidance on how and when to use each class of tool.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Tom Scanlon</dc:creator><pubDate>Mon, 09 Jul 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/10-types-of-application-security-testing-tools-when-and-how-to-use-them/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Testing</category><category>Cybersecurity</category><category>CERT/CC</category><category>Software and Information Assurance</category><category>Cyber Missions</category></item><item><title>8 At-Risk Emerging Technologies</title><link>https://www.sei.cmu.edu/blog/8-at-risk-emerging-technologies/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Identifying 8 emerging technologies at risk for security vulnerabilities, this SEI Blog post covers autonomous systems, AI, 5G networks and more.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dan Klinedinst</dc:creator><pubDate>Mon, 23 Oct 2017 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/8-at-risk-emerging-technologies/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>CERT/CC</category><category>Autonomy and Counter-Autonomy</category><category>Blockchain</category></item><item><title>The CERT Guide to Coordinated Vulnerability Disclosure</title><link>https://www.sei.cmu.edu/blog/the-cert-guide-to-coordinated-vulnerability-disclosure/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Discover the recently released CERT Guide to Coordinated Vulnerability Disclosure in this SEI Blog post.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Allen Householder</dc:creator><pubDate>Tue, 15 Aug 2017 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-cert-guide-to-coordinated-vulnerability-disclosure/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>Vulnerability Mitigation</category><category>CERT/CC</category><category>Cyber Missions</category><category>Best Practices</category></item><item><title>Announcing CERT Basic Fuzzing Framework Version 2.8</title><link>https://www.sei.cmu.edu/blog/announcing-cert-basic-fuzzing-framework-version-28/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Today we are announcing the release of the CERT Basic Fuzzing Framework Version 2.8 (BFF 2.8). It's been about three years since we released BFF 2.7....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Allen Householder</dc:creator><pubDate>Wed, 05 Oct 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/announcing-cert-basic-fuzzing-framework-version-28/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>CERT/CC</category></item><item><title>CVD Series: Principles of Coordinated Vulnerability Disclosure (Part 2 of 9)</title><link>https://www.sei.cmu.edu/blog/cvd-series-principles-of-coordinated-vulnerability-disclosure-part-2-of-9/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog, the second in a nine-part series, explores Coordinated Vulnerability Disclosure (CVD) best practices for vulnerability disclosure.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Garret Wassermann</dc:creator><pubDate>Tue, 04 Oct 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/cvd-series-principles-of-coordinated-vulnerability-disclosure-part-2-of-9/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>CERT/CC</category><category>Best Practices</category></item><item><title>CVD Series: What is Coordinated Vulnerability Disclosure? (Part 1 of 9)</title><link>https://www.sei.cmu.edu/blog/cvd-series-what-is-coordinated-vulnerability-disclosure-part-1-of-9/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This is the first post in a series about Coordinated Vulnerability Disclosure (CVD). In this series, we will discuss why CVD is an important part of the modern software development lifecycle, and how individuals and organizations can establish a CVD process.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Garret Wassermann</dc:creator><pubDate>Tue, 27 Sep 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/cvd-series-what-is-coordinated-vulnerability-disclosure-part-1-of-9/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>CERT/CC Vulnerabilities</category><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Best Practices</category></item><item><title>The Risks of Google Sign-In on iOS Devices</title><link>https://www.sei.cmu.edu/blog/the-risks-of-google-sign-in-on-ios-devices/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The Google Identity Platform is a system that allows you to sign in to applications and other services by using your Google account....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Dormann</dc:creator><pubDate>Tue, 02 Aug 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-risks-of-google-sign-in-on-ios-devices/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Vulnerability Mitigation</category><category>CERT/CC</category><category>Best Practices</category></item></channel></rss>