Companies of all shapes and sizes are faced with an ever increasing list of applications and systems that require regular patching in order to stay ahead of an adversary keen to exploit vulnerabilities.
As with most companies, time is money so the idea that you can continuously take an enterprise offline to conduct patching is unrealistic. A good vulnerability management program must prioritize patching as it relates to the business realities of their organization, but without timely and relevant intelligence this can be a challenge.
Intel 471’s Vulnerability Intelligence is made to both provide relevant and timely intelligence information on the adversary situation and to address the gap in current vulnerability offerings, which focuses mainly on things already being exploited in the wild based on known attacks and open source information. This leaves out the precursors to such activity that lend to a more proactive approach such as an increase in interest levels amongst threat actors, proof-of-concept (POC) code being developed, traded or sold, and ultimately the weaponization and productization of the code as it gets integrated into exploit kits, exploit packs or other tools. This activity often takes place prior to attacks being observed in the wild.
Intel 471’s Vulnerability Intelligence focuses on the precursors to exploitation of vulnerabilities in the wild via a regularly updated dashboard that tracks the life cycle of significant vulnerabilities observed in the underground from initial disclosure to exploit weaponization and productization. Vulnerability Intelligence offers an analyst-driven assessment of priority vulnerabilities beyond volumetric keyword hits, which just isn’t adequate in today’s world.