<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Vulnerability Discovery</title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Vulnerability Discovery</description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/vulnerability-discovery/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 19 Sep 2022 00:00:00 -0400</lastBuildDate><item><title>Using Alternate Data Streams in the Collection and Exfiltration of Data</title><link>https://www.sei.cmu.edu/blog/using-alternate-data-streams-in-the-collection-and-exfiltration-of-data/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In this blog post, we describe how attackers obscure their activity via alternate data streams (ADSs) and how to defend against malware attacks that employ ADSs.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dustin Updyke, Molly Jaconski</dc:creator><pubDate>Mon, 19 Sep 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/using-alternate-data-streams-in-the-collection-and-exfiltration-of-data/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Vulnerability Discovery</category><category>Vulnerability Mitigation</category><category>Malware Analysis</category><category>Malware</category></item><item><title>Six Dimensions of Trust in Autonomous Systems</title><link>https://www.sei.cmu.edu/blog/six-dimensions-of-trust-in-autonomous-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post chronicles the adoption and growth of autonomous systems and provides six considerations for establishing trust.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Paul Nielsen</dc:creator><pubDate>Wed, 20 Apr 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/six-dimensions-of-trust-in-autonomous-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Software Assurance</category><category>Vulnerability Discovery</category><category>Devops</category><category>Artificial Intelligence Engineering</category><category>Machine Learning</category><category>Cybersecurity</category><category>Autonomy and Counter-Autonomy</category><category>Software and Information Assurance</category><category>Human-Machine Interactions</category><category>Artificial Intelligence</category><category>Digital Engineering</category><category>Cyber-Physical Systems</category></item><item><title>How Easy Is It to Make and Detect a Deepfake?</title><link>https://www.sei.cmu.edu/blog/how-easy-is-it-to-make-and-detect-a-deepfake/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The technology underlying the creation and detection of deepfakes and assessment of current and future threat levels</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Catherine Bernaciak, Dominic Ross</dc:creator><pubDate>Mon, 14 Mar 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/how-easy-is-it-to-make-and-detect-a-deepfake/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>Vulnerability Mitigation</category><category>Security-Related Requirements</category><category>Artificial Intelligence Engineering</category><category>Advanced Computing</category></item><item><title>Security Automation Begins at the Source Code</title><link>https://www.sei.cmu.edu/blog/security-automation-begins-at-the-source-code/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Hi, this is Vijay Sarvepalli, Information Security Architect in the CERT Division. On what seemed like a normal day at our vulnerability coordination center, one of my colleagues asked me....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Vijay Sarvepalli</dc:creator><pubDate>Wed, 11 Mar 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/security-automation-begins-at-the-source-code/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>Vulnerability Mitigation</category><category>CERT/CC</category></item><item><title>VPN - A Gateway for Vulnerabilities</title><link>https://www.sei.cmu.edu/blog/vpn-a-gateway-for-vulnerabilities/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Virtual Private Networks (VPNs) are the backbone of today's businesses providing a wide range of entities from remote employees to business partners and...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Vijay Sarvepalli</dc:creator><pubDate>Wed, 13 Nov 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/vpn-a-gateway-for-vulnerabilities/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>Vulnerability Mitigation</category><category>CERT/CC</category></item><item><title>Update on the CERT Guide to Coordinated Vulnerability Disclosure</title><link>https://www.sei.cmu.edu/blog/update-on-the-cert-guide-to-coordinated-vulnerability-disclosure/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>It's been two years since we originally published the CERT Guide to Coordinated Vulnerability Disclosure. In that time, it's influenced both the US Congress and EU Parliament....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Allen Householder</dc:creator><pubDate>Mon, 16 Sep 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/update-on-the-cert-guide-to-coordinated-vulnerability-disclosure/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>Vulnerability Mitigation</category><category>CERT/CC</category><category>Best Practices</category></item><item><title>The Dangers of VHD and VHDX Files</title><link>https://www.sei.cmu.edu/blog/the-dangers-of-vhd-and-vhdx-files/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Recently, I gave a presentation at BSidesPGH 2019 called Death By Thumb Drive: File System Fuzzing with CERT BFF....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Dormann</dc:creator><pubDate>Wed, 04 Sep 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-dangers-of-vhd-and-vhdx-files/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>Vulnerability Mitigation</category><category>CERT/CC</category></item><item><title>Announcing CERT Tapioca 2.0 for Network Traffic Analysis</title><link>https://www.sei.cmu.edu/blog/announcing-cert-tapioca-20-for-network-traffic-analysis/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>A few years ago, I announced the release of CERT Tapioca for MITM Analysis. This virtual machine was created for the purpose of analyzing Android applications to find apps....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Dormann</dc:creator><pubDate>Wed, 23 May 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/announcing-cert-tapioca-20-for-network-traffic-analysis/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>CERT/CC</category></item><item><title>Automatically Stealing Password Hashes with Microsoft Outlook and OLE</title><link>https://www.sei.cmu.edu/blog/automatically-stealing-password-hashes-with-microsoft-outlook-and-ole/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Back in 2016, a coworker of mine was using CERT BFF, and he asked how he could turn a seemingly exploitable crash in Microsoft Office into a proof-of-concept exploit that runs calc.exe....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Dormann</dc:creator><pubDate>Tue, 10 Apr 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/automatically-stealing-password-hashes-with-microsoft-outlook-and-ole/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>CERT/CC</category><category>Best Practices</category></item><item><title>The Curious Case of the Bouncy Castle BKS Passwords</title><link>https://www.sei.cmu.edu/blog/the-curious-case-of-the-bouncy-castle-bks-passwords/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>While investigating BKS files, the path I went down led me to an interesting discovery: BKS-V1 files will accept any number of passwords to reveal information....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Dormann</dc:creator><pubDate>Mon, 19 Mar 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-curious-case-of-the-bouncy-castle-bks-passwords/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>CERT/CC</category></item><item><title>How to Get the Most Out of Penetration Testing</title><link>https://www.sei.cmu.edu/blog/how-to-get-the-most-out-of-penetration-testing/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>There are many reasons for an organization to perform a penetration test of its information systems: to meet compliance standards, test a security team's capabilities....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Michael Cook</dc:creator><pubDate>Tue, 23 Jan 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/how-to-get-the-most-out-of-penetration-testing/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>Insider Threat</category><category>CERT/CC</category></item><item><title>The CERT Guide to Coordinated Vulnerability Disclosure</title><link>https://www.sei.cmu.edu/blog/the-cert-guide-to-coordinated-vulnerability-disclosure/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Discover the recently released CERT Guide to Coordinated Vulnerability Disclosure in this SEI Blog post.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Allen Householder</dc:creator><pubDate>Tue, 15 Aug 2017 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-cert-guide-to-coordinated-vulnerability-disclosure/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>Vulnerability Mitigation</category><category>CERT/CC</category><category>Cyber Missions</category><category>Best Practices</category></item><item><title>Announcing CERT Basic Fuzzing Framework Version 2.8</title><link>https://www.sei.cmu.edu/blog/announcing-cert-basic-fuzzing-framework-version-28/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Today we are announcing the release of the CERT Basic Fuzzing Framework Version 2.8 (BFF 2.8). It's been about three years since we released BFF 2.7....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Allen Householder</dc:creator><pubDate>Wed, 05 Oct 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/announcing-cert-basic-fuzzing-framework-version-28/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>CERT/CC</category></item><item><title>On Board Diagnostics: Risks and Vulnerabilities of the Connected Vehicle</title><link>https://www.sei.cmu.edu/blog/board-diagnostics-risks-and-vulnerabilities-connected-vehicle/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>We worked with DHS US-CERT and the Department of Transportations' Volpe Center to study aftermarket on-board diagnostic (OBD-II) devices....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dan Klinedinst</dc:creator><pubDate>Sat, 20 Aug 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/board-diagnostics-risks-and-vulnerabilities-connected-vehicle/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>CERT/CC</category></item><item><title>Visualizing CERT BFF String Minimization</title><link>https://www.sei.cmu.edu/blog/visualizing-cert-bff-string-minimization/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>I've been working on a presentation called CERT BFF - From Start to PoC. In the process of preparing my material, I realized that a visualization could help people understand what happens during the BFF string minimization process.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Dormann</dc:creator><pubDate>Mon, 06 Jun 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/visualizing-cert-bff-string-minimization/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>CERT/CC</category></item><item><title>Vulnerability IDs, Fast and Slow</title><link>https://www.sei.cmu.edu/blog/vulnerability-ids-fast-and-slow/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The CERT/CC Vulnerability Analysis team has been engaged in a number of community-based efforts surrounding Coordinated Vulnerability Disclosure lately....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Allen Householder</dc:creator><pubDate>Fri, 11 Mar 2016 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/vulnerability-ids-fast-and-slow/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>CERT/CC</category></item><item><title>Coordinating Vulnerabilities in IoT Devices</title><link>https://www.sei.cmu.edu/blog/coordinating-vulnerabilities-iot-devices/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The CERT Coordination Center (CERT/CC) has been receiving an increasing number of vulnerability reports regarding Internet of Things devices and other embedded systems....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dan Klinedinst</dc:creator><pubDate>Wed, 27 Jan 2016 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/coordinating-vulnerabilities-iot-devices/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Internet of Things</category><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>CERT/CC</category></item><item><title>E Pluribus, Que? Identifying Vulnerability Disclosure Stakeholders</title><link>https://www.sei.cmu.edu/blog/e-pluribus-que-identifying-vulnerability-disclosure-stakeholders/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>On September 29, Art Manion and I attended the first meeting of the Multistakeholder Process for Cybersecurity Vulnerabilities....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Allen Householder</dc:creator><pubDate>Thu, 05 Nov 2015 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/e-pluribus-que-identifying-vulnerability-disclosure-stakeholders/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>CERT/CC</category></item><item><title>Recent Conference Presentations by the Vulnerability Analysis Team</title><link>https://www.sei.cmu.edu/blog/recent-conference-presentations-by-the-vulnerability-analysis-team/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>A number of us on the Vulnerability Analysis team have been out and about giving talks at various conferences recently....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Allen Householder</dc:creator><pubDate>Thu, 20 Aug 2015 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/recent-conference-presentations-by-the-vulnerability-analysis-team/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>CERT/CC</category></item><item><title>Reach Out and Mail Someone</title><link>https://www.sei.cmu.edu/blog/reach-out-and-mail-someone/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post discusses the importance of secure email communication, highlighting common risks and suggesting best practices for enhancing email security.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Garret Wassermann</dc:creator><pubDate>Thu, 06 Aug 2015 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/reach-out-and-mail-someone/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>CERT/CC</category></item></channel></rss>