Introducing Strobes VI
One of the Strobes VM use cases is to provide a way for customers to prioritize vulnerabilities in their organization using vulnerability intelligence. Our research and engineering teams created an...
View ArticleA Critical Remote Code Execution(RCE) Vulnerability in Apache Struts2 Flaw...
The web development world is constantly on guard against security threats, and a recent discovery in the popular Apache Struts2 framework serves as a stark reminder. This critical vulnerability, known...
View ArticleJanuary 2024 Top CVE and Vulnerabilities Report
2024 is off to a crazy start in the cybersecurity world! Acquisitions are happening left, right, and center, and new cyber threats are emerging like weeds after a rainstorm. But fear not, security...
View ArticleFebruary 2024 Top CVEs and Vulnerabilities Report
In February, hearts weren’t the only things feeling vulnerable. The cyber arena saw a variety of critical exposures across multiple platforms and applications. While patching might not be as romantic...
View ArticleAtlassian Patches Critical Bamboo Bug and Over 20 Other Vulnerabilities
Atlassian recently addressed a critical security flaw (CVE-2024-1597) impacting Bamboo Data Center and Server versions. This SQL injection vulnerability, discovered by SonarSource security researcher...
View ArticleTop 5 Vulnerabilities for March 2024: A Closer Look at the XZ Utils Supply...
March may have roared in like a lion, but for cybersecurity professionals, it was more like a backdoor sneaking into a critical utility. This month, we’ve seen some serious contenders, but one in...
View ArticleA Closer Look at Top 5 Vulnerabilities of April 2024
Keeping pace with the latest cybersecurity threats is vital for organizations of all sizes. Here at Strobes, our security team has assembled a list of the top 5 most critical Common Vulnerabilities...
View ArticleOpen Source Security: How Strobes Integrates Security into Your Dev Workflow
Cloud-native development thrives on open-source software (OSS). It offers readily available, pre-built components that accelerate development lifecycles. However, this very advantage presents a...
View ArticleTop 5 CVEs and Vulnerabilities of May 2024
May brought a fresh batch of security headaches. This month, we’re focusing on critical vulnerabilities in widely used software like Apache, Gitlab, and Github. These flaws could allow attackers to...
View ArticleCVSS Score: A Comprehensive Guide to Vulnerability Scoring
Security professionals constantly battle to identify and patch vulnerabilities before attackers exploit them. But how do we measure the severity of these vulnerabilities? Enter the Common...
View ArticleCVE-2024-38063: An In-Depth Look at the Critical Remote Code Execution...
In a recent security advisory, Microsoft disclosed a high-severity vulnerability identified as CVE-2024-38063. This critical Remote Code Execution (RCE) flaw, rated with a CVSS score of 9.8, poses a...
View ArticleTop 5 CVEs and Vulnerabilities of August 2024: Key Threats and How to Respond
August has seen some of the most eye-opening vulnerabilities surface, catching the attention of security experts across the globe. These aren’t just numbers in a database, they represent real...
View Article