Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Exploited CVEs of 2024: Lessons for Vendors and Defenders

Автор: FIRST

Загружено: 2025-05-29

Просмотров: 103

Описание:

Patrick Garrity (VulnCheck, US)

Patrick Garrity is a security researcher at VulnCheck where he focuses on vulnerabilities, vulnerability exploitation and threat actors. Patrick has spent the last decade helping building Cybersecurity companies including Duo Security, Censys, Blumira, Nucleus Security and VulnCheck.
--
In 2024, over 750 CVEs were confirmed as exploited in the wild for the first time. This talk will focus on the trends and patterns observed in these known exploited vulnerabilities, offering comprehensive analysis to empower both vendors and defenders.

Key Takeaways: Insights into 2024 exploited CVE trends and patterns. A look at how known exploitation maps to common vulnerability metadata. A deep dive into examples of last year’s exploited vulnerabilities and how to identify risks before exploitation occurs. Recommendations on how vendors and defenders can get early indicators that a threat actor might exploit a vulnerability.

Exploited CVEs of 2024: Lessons for Vendors and Defenders

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

array(10) { [0]=> object(stdClass)#4413 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "HzSkFOKggso" ["related_video_title"]=> string(45) "Building a PSIRT for a Standards Organization" ["posted_time"]=> string(25) "3 недели назад" ["channelName"]=> string(5) "FIRST" } [1]=> object(stdClass)#4386 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "bRscNq3ePCw" ["related_video_title"]=> string(48) "Managing Risk Across the Vulnerability Ecosystem" ["posted_time"]=> string(25) "3 недели назад" ["channelName"]=> string(5) "FIRST" } [2]=> object(stdClass)#4411 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "yGq2GKx0Ypc" ["related_video_title"]=> string(77) "State of Attack Surface Elimination in a World Plagued by Vulnerable Software" ["posted_time"]=> string(25) "3 недели назад" ["channelName"]=> string(5) "FIRST" } [3]=> object(stdClass)#4418 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "B0CgozQ8ywc" ["related_video_title"]=> string(84) "SBOMs in the Real World: Practical Guidance for Managing Three Common SBOM Scenarios" ["posted_time"]=> string(25) "3 недели назад" ["channelName"]=> string(5) "FIRST" } [4]=> object(stdClass)#4397 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "8UAP9D8xdN0" ["related_video_title"]=> string(82) "Growth Summit: Make It Yours - Customizing and Extending Your Brand with Files.com" ["posted_time"]=> string(22) "10 дней назад" ["channelName"]=> string(5) "Files" } [5]=> object(stdClass)#4415 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "Hwyv9WHVyjg" ["related_video_title"]=> string(47) "When it Comes to Managing Risk, Context is King" ["posted_time"]=> string(25) "3 недели назад" ["channelName"]=> string(5) "FIRST" } [6]=> object(stdClass)#4410 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "RgSGjn_Z1dg" ["related_video_title"]=> string(57) "Exploiting and Detecting Palo Alto Networks CVE-2024-0012" ["posted_time"]=> string(27) "5 месяцев назад" ["channelName"]=> string(22) "The Weekly Purple Team" } [7]=> object(stdClass)#4420 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "yYRD3yXmc6s" ["related_video_title"]=> string(187) "⚡️Космический скачок цен — обещание России. Иран недоволен Путиным | Мигдаль, Жуковский | ВОЗДУХ" ["posted_time"]=> string(23) "8 часов назад" ["channelName"]=> string(29) "Ходорковский LIVE" } [8]=> object(stdClass)#4396 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "GRaDuOlyFxs" ["related_video_title"]=> string(171) "Назван организатор теракта в Крокусе | Путин поддержал Иран | Беспредел мародеров под Курском" ["posted_time"]=> string(23) "6 часов назад" ["channelName"]=> string(37) "Популярная политика" } [9]=> object(stdClass)#4414 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "g-SYh9v3W5Y" ["related_video_title"]=> string(103) "Context Matters: Qualitative Insights into Developers’ Approaches and Challenges with Software..." ["posted_time"]=> string(25) "3 недели назад" ["channelName"]=> string(5) "FIRST" } }
Building a PSIRT for a Standards Organization

Building a PSIRT for a Standards Organization

Managing Risk Across the Vulnerability Ecosystem

Managing Risk Across the Vulnerability Ecosystem

State of Attack Surface Elimination in a World Plagued by Vulnerable Software

State of Attack Surface Elimination in a World Plagued by Vulnerable Software

SBOMs in the Real World: Practical Guidance for Managing Three Common SBOM Scenarios

SBOMs in the Real World: Practical Guidance for Managing Three Common SBOM Scenarios

Growth Summit: Make It Yours - Customizing and Extending Your Brand with Files.com

Growth Summit: Make It Yours - Customizing and Extending Your Brand with Files.com

When it Comes to Managing Risk, Context is King

When it Comes to Managing Risk, Context is King

Exploiting and Detecting Palo Alto Networks CVE-2024-0012

Exploiting and Detecting Palo Alto Networks CVE-2024-0012

⚡️Космический скачок цен — обещание России. Иран недоволен Путиным | Мигдаль, Жуковский | ВОЗДУХ

⚡️Космический скачок цен — обещание России. Иран недоволен Путиным | Мигдаль, Жуковский | ВОЗДУХ

Назван организатор теракта в Крокусе | Путин поддержал Иран | Беспредел мародеров под Курском

Назван организатор теракта в Крокусе | Путин поддержал Иран | Беспредел мародеров под Курском

Context Matters: Qualitative Insights into Developers’ Approaches and Challenges with Software...

Context Matters: Qualitative Insights into Developers’ Approaches and Challenges with Software...

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]