Featured on The Edge Threat Monitor

Three ages of KEV catalog
Cybersecurity Analytics
Monitoring Changes in KEV List Can Guide Security TeamsMonitoring Changes in KEV List Can Guide Security Teams

The number of additions to the Known Exploited Vulnerabilities catalog is growing quickly, but even silent changes to already-documented flaws can help security teams prioritize.

More from The Edge Threat Monitor

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.