The CVE Turns 21: The Story of How it Made it This Far The Common Vulnerabilities and Exposures (CVE) turns 21 this year and, just like any 21-year-old, there have been growing pains along the way. This is the story of how it made it this far.

One Line Explanations of Cyber Security Terms One line explanations of cyber security terms such as CVE, vulnerability, CVE ID, CVSS, CNA, bug bounty program, and zero-day vulnerability.

What is a Candidate Naming Authority? A concise explanation of the term 'Candidate Naming Authority'.

What is CVE? A concise explanation of the term 'CVE'.

What is a CVSS? A concise explanation of the term 'CVSS'.

What is a CVE ID? A concise explanation of the term 'CVE ID'.

What is a zero-day? A concise explanation of the term 'zero-day'.

What is a CNA? A concise explanation of the term 'CNA'.

What is a bug bounty program? A concise explanation of the term 'bug bounty program'.

What is a CVE? A concise explanation of the term 'CVE'.

What is a vulnerability? A concise explanation of the term 'vulnerability'.

Building a Web Vulnerability Scanner The Security Audit Tool is a web based vulnerability scanner that looks for the last 6 months of vulnerabilities that may affect a given URL.

Using the World’s Time Zones to Help Your Startup Succeed Managing a startup involves a balancing act of the world's time zones in order to maximise online exposure.

Analysis of CVE-2019-13602: VLC Media Player Integer Underflow CVE-2019-13602 reveals an Integer Underflow in the MP4 file format of the VLC Media Player

From 0 to 200 users It has taken 8 weeks to go from 0 to 200 users, and as of writing this post we are at 237.

100 Users! It took 6 weeks to get the first 50 users and 6 days to get the next 50.