Security Wanderings

Active Directory Reconnaisance

A compilation of resources related to Active Directory reconnaisance & security
read more

Network Automation Resources and Links

A compilation of resources related to Network Automation & Programming
read more

CISA KEV and EPSS Insights with Google Looker Studio

Explore an interactive Google Looker Studio dashboard merging cybersecurity insights from CISA KEV (Cybersecurity and Infrastructure Security Agency's Known Exploited Vulnerabilities) and EPSS (Exploit Prediction Scoring System) scores.
read more

CISA KEV Google Spreadsheet

A Google Spreadsheet directly sourced from the CISA KEV Catalog, updated automatically every 7 days. It's a data source with minimal elaboration to allow direct analysis.
read more

CISA KEV Introduction

Understanding CISA KEV Catalog

The CISA Known Exploited Vulnerabilities (KEV) Catalog stands as a critical resource curated by the Cybersecurity and Infrastructure Security Agency (CISA) to aid in identifying vulnerabilities actively exploited by cybercriminals. It combines automated scanning, manual monitoring, and collaboration with industry experts to compile a list of vulnerabilities exploited in recent attacks.

Vulnerabilities in the KEV Catalog

Vulnerabilities listed within the KEV Catalog possess specific attributes that distinguish them. These characteristics include:

These characteristics serve as key markers for vulnerabilities deemed critical, necessitating immediate attention and remediation to fortify the security posture of organizations and individuals against known threats.

read more