Request a Demo

Simply the best vulnerability remediation resources out there today

Did you know that Black Hat 2020 is happening this week? All things considered, it might have just gone under your radar. And with every event either being canceled altogether or making the necessary adjustments to go virtual, from your local meetups to the biggest conventions, managing to find truly valuable resources at this time is actually a big win. That’s where we come in. In this blog, we’ve put together a list of the top vulnerability remediation and infosec resources for you to use.

Black Hat USA 2020

Black Hat is one of the world’s leading information security events. Going virtual this year from August 1st through the 6th, the conference will provide it’s remote attendees with the latest security research, development and trends.

DEF CON 28 Safe Mode

DEF CON is one of the world’s largest and most notable hacker conventions. Running virtually on August 7th through the 9th, DEF CON 28 Safe Mode will be a great source of information for the latest threats, tech and knowledge.

The Vulnerability Report

The Vulnerability Report from Vulcan Cyber is a webcast series for unique insights into the latest infrastructure and application vulnerabilities threatening your digital business. With a remediation focused mindset, the Vulnerability Report provides useful tips, tricks, best solutions and remedies that matter most.

Sign Up for  The Vulnerability Report

AppSec Days - Summer of Security 2020

The OWASP Foundation has been hosting AppSec Days throughout the summer, with the next event coming up on August 25th-26th. AppSec Days offer virtual training courses, offering you a great chance to develop and improve your AppSec skills

Bleeping Computer

Bleeping Computer is packed with resources to answer any of your security queries. This lively community, consisting of over 700,000 members, is a great opportunity to learn from your peers and improve professionally.

GB Hackers

GB Hackers is a dedicated news platform offering the latest news in the cyber security space. We recommend following their feed for the latest on the newest vulnerabilities, hacking news, malware attacks and more.

The Hacker News

The Hacker News is a widely-trusted cybersecurity news platform, attracting over eight million monthly readers including IT professionals, researchers, hackers and more. It offers the latest news and along with more in-depth coverage of security trends

Dark Reading

Dark Reading is not only one of the most widely-read cyber security sites, it’s also a popular community for security professionals from around the world. It’s a great source to read up and discuss the latest threats, vulnerabilities and trends.

CISA (Cybersecurity and Infrastructure Security Agency)

CISA is “the Nation’s risk advisor” (the Nation being the United States for all you global readers out there). It provides extensive knowledge and practices to its readers, building awareness, promoting better risk management and helping professionals mitigate new threats and vulnerabilities.

Threatpost

Threatpost is an independent new site containing valuable information about IT and business security for hundreds of thousands professionals worldwide. It provides valuable security news along with aggregated news from other sources.

Sign Up for  The Vulnerability Report

Don’t miss out on the latest

Get notified on Industry updates.
we promise not to spam

Related Posts

Popular Articles

03.3.2020 | vulnerabilities , Ghostcat

| Posted by Yonatan Amitay
The Apache Tomcat servers that have been released over the last thirteen years are vulnerable to a bug known as “Ghostcat” (CVE-2020-1938) that ...
Read more

07.15.2020 | vulnerabilities , SIGRed

| Posted by Yonatan Amitay
What is the SIGRed Vulnerability (CVE-2020-1350)? SIGRed (CVE-2020-1350) is a critical, wormable RCE (remote code execution) vulnerability in the ...
Read more

07.30.2020 | vulnerabilities

| Posted by Yonatan Amitay
TL;DR The BootHole vulnerability is not critical (yet), but it could potentially effect billions of devices worldwide. Exploiting it requires high ...
Read more