<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en-us" xmlns="http://www.w3.org/2005/Atom"><title>SEI Blog | Security Vulnerabilities</title><link href="http://sei.cmu.edu/feeds/topic/security-vulnerabilities/atom/?utm_source=blog&amp;utm_medium=rss" rel="alternate"/><link href="http://sei.cmu.edu/feeds/topic/security-vulnerabilities/atom/?utm_source=blog&amp;utm_medium=rss" rel="self"/><id>http://sei.cmu.edu/feeds/topic/security-vulnerabilities/atom/?utm_source=blog&amp;utm_medium=rss</id><updated>2026-01-28T00:00:00-05:00</updated><subtitle>Updates on changes and additions to the                         SEI Blog for posts matching Security Vulnerabilities</subtitle><entry><title>From Concept to Practice: How SSVC Has Evolved to Make Adoption Possible</title><link href="https://www.sei.cmu.edu/blog/from-concept-to-practice-how-ssvc-has-evolved-to-make-adoption-possible/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2026-01-28T00:00:00-05:00</published><updated>2026-01-28T00:00:00-05:00</updated><author><name>Renae Metcalf, Allen Householder, Vijay Sarvepalli</name></author><id>https://www.sei.cmu.edu/blog/from-concept-to-practice-how-ssvc-has-evolved-to-make-adoption-possible/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post traces the milestones of the Stakeholder Specific Vulnerability Categorization and invites the community to participate, contribute, and benefit from the continued maturation of SSVC.</summary></entry><entry><title>What’s New in SSVC: Build, Explore, and Evolve Your Decision Models</title><link href="https://www.sei.cmu.edu/blog/whats-new-in-ssvc-build-explore-and-evolve-your-decision-models/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2025-10-13T00:00:00-04:00</published><updated>2025-10-13T00:00:00-04:00</updated><author><name>Bon Jin Koo, Renae Metcalf, Vijay Sarvepalli, Allen Householder</name></author><id>https://www.sei.cmu.edu/blog/whats-new-in-ssvc-build-explore-and-evolve-your-decision-models/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Recent updates to the Stakeholder-Specific Vulnerability Categorization (SSVC) framework help different stakeholders to prioritize vulnerabilities according to their distinct risk appetites.</summary></entry><entry><title>The Threat of Deprecated BGP Attributes</title><link href="https://www.sei.cmu.edu/blog/the-threat-of-deprecated-bgp-attributes/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2024-06-03T00:00:00-04:00</published><updated>2024-06-03T00:00:00-04:00</updated><author><name>Leigh Metcalf, Timur Snoke</name></author><id>https://www.sei.cmu.edu/blog/the-threat-of-deprecated-bgp-attributes/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post examines how a small issue with Border Gateway Protocol routing, a deprecated path attribute, can cause a major interruption to Internet traffic.</summary></entry><entry><title>UEFI: 5 Recommendations for Securing and Restoring Trust</title><link href="https://www.sei.cmu.edu/blog/uefi-5-recommendations-for-securing-restoring-trust/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2023-06-26T00:00:00-04:00</published><updated>2023-06-26T00:00:00-04:00</updated><author><name>Vijay Sarvepalli</name></author><id>https://www.sei.cmu.edu/blog/uefi-5-recommendations-for-securing-restoring-trust/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This blog post expands on concerns brought to light from recent UEFI attacks, such as BlackLotus, and highlights 5 recommendations to secure and restore trust in the UEFI ecosystem.</summary><category term="Security Vulnerabilities"/><category term="CERT/CC"/></entry><entry><title>Vultron: A Protocol for Coordinated Vulnerability Disclosure</title><link href="https://www.sei.cmu.edu/blog/vultron-a-protocol-for-coordinated-vulnerability-disclosure/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2022-09-26T00:00:00-04:00</published><updated>2022-09-26T00:00:00-04:00</updated><author><name>Allen Householder</name></author><id>https://www.sei.cmu.edu/blog/vultron-a-protocol-for-coordinated-vulnerability-disclosure/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post introduces Vultron, a protocol for multi-party coordinated vulnerability disclosure (MPCVD).</summary><category term="Security Vulnerabilities"/><category term="CERT/CC"/></entry><entry><title>UEFI – Terra Firma for Attackers</title><link href="https://www.sei.cmu.edu/blog/uefi-terra-firma-for-attackers/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2022-08-01T00:00:00-04:00</published><updated>2022-08-01T00:00:00-04:00</updated><author><name>Vijay Sarvepalli</name></author><id>https://www.sei.cmu.edu/blog/uefi-terra-firma-for-attackers/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This blog post focuses on how the vulnerabilities in firmware popularized by the Uniform Extensible Firmware Interface create a lucrative target for high-profile attackers.</summary><category term="Security Vulnerabilities"/><category term="CERT/CC"/></entry><entry><title>Probably Don’t Rely on EPSS Yet</title><link href="https://www.sei.cmu.edu/blog/probably-dont-rely-on-epss-yet/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2022-06-06T00:00:00-04:00</published><updated>2022-06-06T00:00:00-04:00</updated><author><name>Jonathan Spring</name></author><id>https://www.sei.cmu.edu/blog/probably-dont-rely-on-epss-yet/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post evaluates the pros and cons of the Exploit Prediction Scoring System (EPSS), a data-driven model designed to estimate the probability that software vulnerabilities will be exploited in practice.</summary><category term="Security Vulnerabilities"/><category term="CERT/CC"/></entry><entry><title>The Latest Work from the SEI: Coordinated Vulnerability Disclosure, Cybersecurity Research, Cyber Risk and Resilience, and the Importance of Fostering Diversity in Software Engineering</title><link href="https://www.sei.cmu.edu/blog/the-latest-work-from-the-sei-coordinated-vulnerability-disclosure-cybersecurity-research-cyber-risk-and-resilience-and-the-importance-of-fostering-diversity-in-software-engineering/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2021-09-06T00:00:00-04:00</published><updated>2021-09-06T00:00:00-04:00</updated><author><name>Douglas Schmidt</name></author><id>https://www.sei.cmu.edu/blog/the-latest-work-from-the-sei-coordinated-vulnerability-disclosure-cybersecurity-research-cyber-risk-and-resilience-and-the-importance-of-fostering-diversity-in-software-engineering/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This post highlights the latest work from the SEI in coordinated vulnerability disclosure, cyber risk and resilience management, automation, and the science of cybersecurity.</summary><category term="Security Vulnerabilities"/><category term="CERT/CC"/></entry><entry><title>Vulnerabilities: Everybody’s Got One!</title><link href="https://www.sei.cmu.edu/blog/vulnerabilities-everybodys-got-one/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2021-06-16T00:00:00-04:00</published><updated>2021-06-16T00:00:00-04:00</updated><author><name>Leigh Metcalf</name></author><id>https://www.sei.cmu.edu/blog/vulnerabilities-everybodys-got-one/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">In this post, Leigh Metcalf describes how she pulled data from the malvuln project to explore recent vulnerabilities in both malware and non-malware to study the differences.</summary><category term="CERT/CC Vulnerabilities"/><category term="Vulnerability Analysis"/><category term="Malware Analysis"/><category term="Malware"/></entry><entry><title>CERT/CC Comments on Standards and Guidelines to Enhance Software Supply Chain Security</title><link href="https://www.sei.cmu.edu/blog/certcc-comments-on-standards-and-guidelines-to-enhance-software-supply-chain-security/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2021-06-01T00:00:00-04:00</published><updated>2021-06-01T00:00:00-04:00</updated><author><name>Jonathan Spring</name></author><id>https://www.sei.cmu.edu/blog/certcc-comments-on-standards-and-guidelines-to-enhance-software-supply-chain-security/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This SEI Blog post shares insights from the CERT Coordination Center (CERT/CC) on proposed software supply chain security standards and guidelines.</summary><category term="Security Vulnerabilities"/><category term="CERT/CC"/></entry><entry><title>Cat and Mouse in the Age of .NET</title><link href="https://www.sei.cmu.edu/blog/cat-and-mouse-age-net/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-11-19T00:00:00-05:00</published><updated>2020-11-19T00:00:00-05:00</updated><author><name>Brandon Marzik</name></author><id>https://www.sei.cmu.edu/blog/cat-and-mouse-age-net/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This SEI Blog post explores evolving .NET threat landscape with challenges faced by red and blue teams and suggests ways to stay ahead of attackers.</summary><category term="Security Vulnerabilities"/><category term="CERT/CC"/><category term="Cybersecurity"/><category term="Best Practices in Network Security"/></entry><entry><title>Adversarial ML Threat Matrix: Adversarial Tactics, Techniques, and Common Knowledge of Machine Learning</title><link href="https://www.sei.cmu.edu/blog/adversarial-ml-threat-matrix-adversarial-tactics-techniques-and-common-knowledge-of-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-10-22T00:00:00-04:00</published><updated>2020-10-22T00:00:00-04:00</updated><author><name>Jonathan Spring</name></author><id>https://www.sei.cmu.edu/blog/adversarial-ml-threat-matrix-adversarial-tactics-techniques-and-common-knowledge-of-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This SEI Blog post introduces the Adversarial ML Threat Matrix, a list of tactics to exploit machine learning models, and guidance on defense against them.</summary><category term="Vulnerability Mitigation"/><category term="Security Vulnerabilities"/><category term="CERT/CC"/><category term="Autonomy and Counter-Autonomy"/></entry><entry><title>Three Places to Start in Defending Against Ransomware</title><link href="https://www.sei.cmu.edu/blog/three-places-to-start-in-defending-against-ransomware/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-10-12T00:00:00-04:00</published><updated>2020-10-12T00:00:00-04:00</updated><author><name>Timothy Shimeall</name></author><id>https://www.sei.cmu.edu/blog/three-places-to-start-in-defending-against-ransomware/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Learn three initial efforts for defending against ransomware in this informative SEI Blog post.</summary><category term="Security Vulnerabilities"/><category term="Ransomware"/><category term="CERT/CC"/></entry><entry><title>Ransomware as a Service (RaaS) Threats</title><link href="https://www.sei.cmu.edu/blog/ransomware-as-a-service-raas-threats/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-10-05T00:00:00-04:00</published><updated>2020-10-05T00:00:00-04:00</updated><author><name>Marisa Midler</name></author><id>https://www.sei.cmu.edu/blog/ransomware-as-a-service-raas-threats/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This blog post explores the economics behind why ransomware remains a top tool for cybercrime and presents the current active ransomware variants that utilize ransomware as a service (RaaS), a change in the ransomware business model that could lead to a significant upswing in ransomware activity.</summary><category term="Security Vulnerabilities"/><category term="Ransomware"/><category term="CERT/CC"/></entry><entry><title>Snake Ransomware Analysis Updates</title><link href="https://www.sei.cmu.edu/blog/snake-ransomware-analysis-updates/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-03-23T00:00:00-04:00</published><updated>2020-03-23T00:00:00-04:00</updated><author><name>Kyle O'Meara</name></author><id>https://www.sei.cmu.edu/blog/snake-ransomware-analysis-updates/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">In January 2020, Sentinel Labs published two reports on Snake (also known as Ekans) ransomware.[1][2] The Snake ransomware gained attention due to its ability to terminate specific industrial control system (ICS) processes....</summary><category term="Malware Analysis"/><category term="Security Vulnerabilities"/><category term="CERT/CC"/></entry><entry><title>Bridging the Gap Between Research and Practice</title><link href="https://www.sei.cmu.edu/blog/bridging-the-gap-between-research-and-practice/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-03-23T00:00:00-04:00</published><updated>2020-03-23T00:00:00-04:00</updated><author><name>Leigh Metcalf</name></author><id>https://www.sei.cmu.edu/blog/bridging-the-gap-between-research-and-practice/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">A fundamental goal for a federally funded research and development center (FFRDC) is to bridge the gap between research and practice for government customers....</summary><category term="Security Vulnerabilities"/><category term="CERT/CC"/></entry><entry><title>Security Automation Begins at the Source Code</title><link href="https://www.sei.cmu.edu/blog/security-automation-begins-at-the-source-code/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-03-11T00:00:00-04:00</published><updated>2020-03-11T00:00:00-04:00</updated><author><name>Vijay Sarvepalli</name></author><id>https://www.sei.cmu.edu/blog/security-automation-begins-at-the-source-code/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Hi, this is Vijay Sarvepalli, Information Security Architect in the CERT Division. On what seemed like a normal day at our vulnerability coordination center, one of my colleagues asked me....</summary><category term="Vulnerability Analysis"/><category term="Security Vulnerabilities"/><category term="Vulnerability Discovery"/><category term="Vulnerability Mitigation"/><category term="CERT/CC"/></entry><entry><title>Comments on NIST IR 8269: A Taxonomy and Terminology of Adversarial Machine Learning</title><link href="https://www.sei.cmu.edu/blog/comments-on-nist-ir-8269-a-taxonomy-and-terminology-of-adversarial-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-02-13T00:00:00-05:00</published><updated>2020-02-13T00:00:00-05:00</updated><author><name>Jonathan Spring</name></author><id>https://www.sei.cmu.edu/blog/comments-on-nist-ir-8269-a-taxonomy-and-terminology-of-adversarial-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">The U.S. National Institute of Standards and Technology (NIST) recently held a public comment period on their draft report on proposed taxonomy and terminology of Adversarial Machine Learning (AML)....</summary><category term="Security Vulnerabilities"/><category term="CERT/CC"/><category term="Autonomy and Counter-Autonomy"/><category term="Software and Information Assurance"/><category term="System Verification and Validation"/><category term="Mission Assurance"/></entry><entry><title>Prioritizing Vulnerability Response with a Stakeholder-Specific Vulnerability Categorization</title><link href="https://www.sei.cmu.edu/blog/prioritizing-vulnerability-response-with-a-stakeholder-specific-vulnerability-categorization/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2019-12-05T00:00:00-05:00</published><updated>2019-12-05T00:00:00-05:00</updated><author><name>Allen Householder</name></author><id>https://www.sei.cmu.edu/blog/prioritizing-vulnerability-response-with-a-stakeholder-specific-vulnerability-categorization/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">We've just released a follow-up paper in our research agenda about prioritizing actions during vulnerability management, Prioritizing Vulnerability Response: A Stakeholder-Specific Vulnerability Categorization....</summary><category term="Vulnerability Analysis"/><category term="Security Vulnerabilities"/><category term="Vulnerability Mitigation"/><category term="CERT/CC"/><category term="Software and Information Assurance"/></entry><entry><title>Machine Learning in Cybersecurity</title><link href="https://www.sei.cmu.edu/blog/machine-learning-cybersecurity-2019/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2019-12-02T00:00:00-05:00</published><updated>2019-12-02T00:00:00-05:00</updated><author><name>Jonathan Spring</name></author><id>https://www.sei.cmu.edu/blog/machine-learning-cybersecurity-2019/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Our technical report provides an overview of the relevant parts of an ML lifecycle--selecting the right problem, the right data, and the right math and summarizing the model output for consumption--as well as questions that relate to those areas of focus.</summary><category term="Software and Information Assurance"/><category term="Machine Learning"/><category term="Cyber Missions"/></entry></feed>