Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-30481PUBLISHED: 2021-04-10Valve Steam through 2021-04-10, when a Source engine game is installed, allows remote authenticated users to execute arbitrary code because of a buffer overflow that occurs for a Steam invite after one click.
CVE-2021-20020PUBLISHED: 2021-04-10A command execution vulnerability in SonicWall GMS 9.3 allows a remote unauthenticated attacker to locally escalate privilege to root.
CVE-2021-30480PUBLISHED: 2021-04-09
Zoom Chat through 2021-04-09 on Windows and macOS allows certain remote authenticated attackers to execute arbitrary code without user interaction. An attacker must be within the same organization, or an external party who has been accepted as a contact. NOTE: this is specific to the Zoom Chat softw...
CVE-2021-21194PUBLISHED: 2021-04-09Use after free in screen sharing in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2021-21195PUBLISHED: 2021-04-09Use after free in V8 in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
User Rank: Apprentice
4/15/2019 | 5:30:14 PM
Vendors, such as ourselves, can easily see ourselves fitting all three of those categories. At Netsurion, we deliver what we call a co-managed SIEM. I would say that it easily aligns with the concept of a SOC-as-a-Service as well. It includes a fractional SOC team (EventTracker SOC) to fit the needs of the organization, that operates a SIEM platform (EventTracker SIEM) complete with managed security services like vulnerability assessment service, managed EDR (EventTracker EDR), and even managed threat deception service (EventTracker Honeynet) to name a few.
I think regardless of where you land on MSSP, co-managed SIEM, and SOC-as-a-Service markets, most would agree that more technology alone is not going to cut it for 90% of organizations with a security team of 1... or none. All of these solutions address the need for cybersecurity convergence, but are different in what degree do they provide product, people, and process to solve the problem. What layers of defense are within scope? How is it deployed and maintained? How are responsibilities aligned between vendor and customer?