<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Vulnerability Mitigation</title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Vulnerability Mitigation</description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/vulnerability-mitigation/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 19 Sep 2022 00:00:00 -0400</lastBuildDate><item><title>Using Alternate Data Streams in the Collection and Exfiltration of Data</title><link>https://www.sei.cmu.edu/blog/using-alternate-data-streams-in-the-collection-and-exfiltration-of-data/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In this blog post, we describe how attackers obscure their activity via alternate data streams (ADSs) and how to defend against malware attacks that employ ADSs.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dustin Updyke, Molly Jaconski</dc:creator><pubDate>Mon, 19 Sep 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/using-alternate-data-streams-in-the-collection-and-exfiltration-of-data/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Vulnerability Discovery</category><category>Vulnerability Mitigation</category><category>Malware Analysis</category><category>Malware</category></item><item><title>How Easy Is It to Make and Detect a Deepfake?</title><link>https://www.sei.cmu.edu/blog/how-easy-is-it-to-make-and-detect-a-deepfake/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The technology underlying the creation and detection of deepfakes and assessment of current and future threat levels</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Catherine Bernaciak, Dominic Ross</dc:creator><pubDate>Mon, 14 Mar 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/how-easy-is-it-to-make-and-detect-a-deepfake/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>Vulnerability Mitigation</category><category>Security-Related Requirements</category><category>Artificial Intelligence Engineering</category><category>Advanced Computing</category></item><item><title>Adversarial ML Threat Matrix: Adversarial Tactics, Techniques, and Common Knowledge of Machine Learning</title><link>https://www.sei.cmu.edu/blog/adversarial-ml-threat-matrix-adversarial-tactics-techniques-and-common-knowledge-of-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post introduces the Adversarial ML Threat Matrix, a list of tactics to exploit machine learning models, and guidance on defense against them.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jonathan Spring</dc:creator><pubDate>Thu, 22 Oct 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/adversarial-ml-threat-matrix-adversarial-tactics-techniques-and-common-knowledge-of-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Mitigation</category><category>Security Vulnerabilities</category><category>CERT/CC</category><category>Autonomy and Counter-Autonomy</category></item><item><title>Security Automation Begins at the Source Code</title><link>https://www.sei.cmu.edu/blog/security-automation-begins-at-the-source-code/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Hi, this is Vijay Sarvepalli, Information Security Architect in the CERT Division. On what seemed like a normal day at our vulnerability coordination center, one of my colleagues asked me....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Vijay Sarvepalli</dc:creator><pubDate>Wed, 11 Mar 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/security-automation-begins-at-the-source-code/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>Vulnerability Mitigation</category><category>CERT/CC</category></item><item><title>Prioritizing Vulnerability Response with a Stakeholder-Specific Vulnerability Categorization</title><link>https://www.sei.cmu.edu/blog/prioritizing-vulnerability-response-with-a-stakeholder-specific-vulnerability-categorization/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>We've just released a follow-up paper in our research agenda about prioritizing actions during vulnerability management, Prioritizing Vulnerability Response: A Stakeholder-Specific Vulnerability Categorization....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Allen Householder</dc:creator><pubDate>Thu, 05 Dec 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/prioritizing-vulnerability-response-with-a-stakeholder-specific-vulnerability-categorization/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Vulnerability Mitigation</category><category>CERT/CC</category><category>Software and Information Assurance</category></item><item><title>VPN - A Gateway for Vulnerabilities</title><link>https://www.sei.cmu.edu/blog/vpn-a-gateway-for-vulnerabilities/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Virtual Private Networks (VPNs) are the backbone of today's businesses providing a wide range of entities from remote employees to business partners and...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Vijay Sarvepalli</dc:creator><pubDate>Wed, 13 Nov 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/vpn-a-gateway-for-vulnerabilities/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>Vulnerability Mitigation</category><category>CERT/CC</category></item><item><title>It's Time to Retire Your Unsupported Things</title><link>https://www.sei.cmu.edu/blog/its-time-to-retire-your-unsupported-things/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>"If it ain't broke, don't fix it." Why mess with something that already works? This is fair advice with many things in life. But when it comes to software security, it's important to....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Dormann</dc:creator><pubDate>Wed, 23 Oct 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/its-time-to-retire-your-unsupported-things/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Mitigation</category><category>Security Vulnerabilities</category><category>CERT/CC</category><category>Best Practices</category></item><item><title>Update on the CERT Guide to Coordinated Vulnerability Disclosure</title><link>https://www.sei.cmu.edu/blog/update-on-the-cert-guide-to-coordinated-vulnerability-disclosure/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>It's been two years since we originally published the CERT Guide to Coordinated Vulnerability Disclosure. In that time, it's influenced both the US Congress and EU Parliament....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Allen Householder</dc:creator><pubDate>Mon, 16 Sep 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/update-on-the-cert-guide-to-coordinated-vulnerability-disclosure/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>Vulnerability Mitigation</category><category>CERT/CC</category><category>Best Practices</category></item><item><title>The Dangers of VHD and VHDX Files</title><link>https://www.sei.cmu.edu/blog/the-dangers-of-vhd-and-vhdx-files/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Recently, I gave a presentation at BSidesPGH 2019 called Death By Thumb Drive: File System Fuzzing with CERT BFF....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Dormann</dc:creator><pubDate>Wed, 04 Sep 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-dangers-of-vhd-and-vhdx-files/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>Vulnerability Mitigation</category><category>CERT/CC</category></item><item><title>Life Beyond Microsoft EMET</title><link>https://www.sei.cmu.edu/blog/life-beyond-microsoft-emet/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Approximately eight years ago (September 2010), Microsoft released EMET (Enhanced Mitigation Experience Toolkit) 2.0. In the world of software defenders, there was much rejoicing....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Dormann</dc:creator><pubDate>Wed, 29 Aug 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/life-beyond-microsoft-emet/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Mitigation</category><category>Security Vulnerabilities</category><category>CERT/CC</category></item><item><title>When "ASLR" Is Not Really ASLR - The Case of Incorrect Assumptions and Bad Defaults</title><link>https://www.sei.cmu.edu/blog/when-aslr-is-not-really-aslr-the-case-of-incorrect-assumptions-and-bad-defaults/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>As a vulnerability analyst at the CERT Coordination Center, I am interested not only in software vulnerabilities themselves, but also exploits and exploit mitigations....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Dormann</dc:creator><pubDate>Fri, 03 Aug 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/when-aslr-is-not-really-aslr-the-case-of-incorrect-assumptions-and-bad-defaults/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Mitigation</category><category>Security Vulnerabilities</category><category>CERT/CC</category><category>Best Practices</category></item><item><title>The CERT Guide to Coordinated Vulnerability Disclosure</title><link>https://www.sei.cmu.edu/blog/the-cert-guide-to-coordinated-vulnerability-disclosure/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Discover the recently released CERT Guide to Coordinated Vulnerability Disclosure in this SEI Blog post.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Allen Householder</dc:creator><pubDate>Tue, 15 Aug 2017 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-cert-guide-to-coordinated-vulnerability-disclosure/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>Vulnerability Mitigation</category><category>CERT/CC</category><category>Cyber Missions</category><category>Best Practices</category></item><item><title>The Consequences of Insecure Software Updates</title><link>https://www.sei.cmu.edu/blog/the-consequences-of-insecure-software-updates/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In this blog post, I discuss the impact of insecure software updates as well as several related topics, including mistakes made by software vendors in their update mechanisms, how to verify the security of a software update, and how vendors can implement secure software updating mechanisms.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Dormann</dc:creator><pubDate>Fri, 30 Jun 2017 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-consequences-of-insecure-software-updates/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Mitigation</category><category>Security Vulnerabilities</category><category>CERT/CC</category><category>Best Practices</category></item><item><title>The Twisty Maze of Getting Microsoft Office Updates</title><link>https://www.sei.cmu.edu/blog/the-twisty-maze-of-getting-microsoft-office-updates/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post explores the complexities and challenges of managing Microsoft Office updates and provides insights into installation best practices.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Dormann</dc:creator><pubDate>Thu, 13 Apr 2017 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-twisty-maze-of-getting-microsoft-office-updates/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Mitigation</category><category>Security Vulnerabilities</category><category>CERT/CC</category><category>Best Practices</category></item><item><title>Windows 10 Cannot Protect Insecure Applications Like EMET Can</title><link>https://www.sei.cmu.edu/blog/windows-10-cannot-protect-insecure-applications-like-emet-can/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Recently, Microsoft published a blog post called Moving Beyond EMET that appears to make two main points....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Dormann</dc:creator><pubDate>Mon, 21 Nov 2016 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/windows-10-cannot-protect-insecure-applications-like-emet-can/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Mitigation</category><category>Security Vulnerabilities</category><category>CERT/CC</category></item><item><title>The Risks of Google Sign-In on iOS Devices</title><link>https://www.sei.cmu.edu/blog/the-risks-of-google-sign-in-on-ios-devices/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The Google Identity Platform is a system that allows you to sign in to applications and other services by using your Google account....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Dormann</dc:creator><pubDate>Tue, 02 Aug 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-risks-of-google-sign-in-on-ios-devices/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>Vulnerability Mitigation</category><category>CERT/CC</category><category>Best Practices</category></item><item><title>Bypassing Application Whitelisting</title><link>https://www.sei.cmu.edu/blog/bypassing-application-whitelisting/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Application whitelisting is a useful defense against users running unapproved applications....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Dormann</dc:creator><pubDate>Thu, 30 Jun 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/bypassing-application-whitelisting/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Mitigation</category><category>Security Vulnerabilities</category><category>CERT/CC</category><category>Best Practices</category></item><item><title>Who Needs to Exploit Vulnerabilities When You Have Macros?</title><link>https://www.sei.cmu.edu/blog/who-needs-to-exploit-vulnerabilities-when-you-have-macros/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Recently, there has been a resurgence of malware that is spread via Microsoft Word macro capabilities....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Dormann</dc:creator><pubDate>Wed, 08 Jun 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/who-needs-to-exploit-vulnerabilities-when-you-have-macros/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Mitigation</category><category>Security Vulnerabilities</category><category>CERT/CC</category><category>Best Practices</category></item><item><title>Supporting the Android Ecosystem</title><link>https://www.sei.cmu.edu/blog/supporting-android-ecosystem/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>A few months ago, a widely-publicized set of vulnerabilities called StageFright hit the Android ecosystem....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Dormann</dc:creator><pubDate>Mon, 19 Oct 2015 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/supporting-android-ecosystem/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Mitigation</category><category>Security Vulnerabilities</category><category>CERT/CC</category><category>Best Practices</category></item><item><title>Instant KARMA Might Still Get You</title><link>https://www.sei.cmu.edu/blog/instant-karma-might-still-get-you/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>About a year ago, I started looking into Android applications that aren't validating SSL certificates. Lately I've been checking whether IOS applications are consistently checking SSL certificates, and they appear to be pretty similar to Android applications in that regard.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Dormann</dc:creator><pubDate>Tue, 11 Aug 2015 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/instant-karma-might-still-get-you/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Mitigation</category><category>Security Vulnerabilities</category><category>CERT/CC</category></item></channel></rss>