Digital Shadows is now a ReliaQuest Company
General Cyber Security / Vulnerability Intelligence: Introducing SearchLight’s Newest Capability

Vulnerability Intelligence: Introducing SearchLight’s Newest Capability

Vulnerability Intelligence: Introducing SearchLight’s Newest Capability
Russell Bentley
Read More From Russell Bentley
January 31, 2022 | 4 Min Read

Digital Shadows’ new vulnerability intelligence capability brings a unique context to CVEs. Armed with this intelligence, security teams can better prioritize their vulnerability management efforts.

Beyond CVSS Scoring

More than 20,000 vulnerabilities were reported in 2021 – vulnerabilities that attackers are rapidly incorporating into their campaigns. When new vulnerabilities are announced, speed of response is critical. Unfortunately, security teams do not have sufficient information to effectively prioritize these efforts.

For many organizations, CVSS provides a way to prioritize and focus response efforts. However, even reducing the team’s focus to the CVEs with the highest CVSS scores leaves potential thousands of vulnerabilities to focus on. Worse still (and as discussed in our newly-published Vulnerability Intelligence Solutions Guide) CVSS scores fail to provide an accurate picture of the true risk. This means that you might be ignoring a low scored CVE that is being exploited by threat actors, or focusing on “high risk” vulnerabilities that have never been exploited. 

Others have fused CVSS with crude measures of “buzz”, by monitoring how often a CVE or alias is mentioned on the internet. This adds little value without an assessment of the reliability of the source, and understanding the context of the mention.

Vulnerability intelligence provides insight into how any given CVE is being used, traded, or discussed across the threat landscape, including source assessments and easy to interpret risk factors. Armed with this intelligence, teams can better decide how to respond.

Bringing Intelligence Expertise to Vulnerability Management

Given its importance, vulnerability intelligence is fast emerging as one of the most sought after intelligence capabilities. Unfortunately, existing solutions fall short for one of three reasons.

  1. Limited visibility. Important information about vulnerabilities can surface across a wide range of online locations. Vulnerability and exploit database, code repositories, pastes sites, social media, criminal forums, vendor websites, security researchers, and various messaging channels. Solutions that only provide visibility into a small number of these sources will miss vital information.
  2. Ambiguous scoring. Solutions will re-score vulnerabilities with observed threat activity, but the new score is unhelpfully ambiguous. It can be impossible to know exactly why a given vulnerability has been scored higher or lower. 
  3. Data, not intelligence. Solutions that rely on bulk collection, automated feeds, and keyword matching serve to overwhelm security teams. Instead of focusing on the most important vulnerabilities, you are drawn to the CVEs attracting the most hype. 

It’s now time to go beyond basic keyword matching to provide genuine intelligence expertise to vulnerability management.

The SearchLight Solution

SearchLight’s new Vulnerability Intelligence module provides access to the industry’s most comprehensive intelligence on vulnerabilities, outlining how they are being exploited, interest levels, and mitigation advice. 

A dedicated team of vulnerability intelligence analysts combine automated collection with their own continuous monitoring. Any mention of a CVE is properly investigated, unnecessary noise is removed, and reliability of the authors is assessed. Our team identifies associated risk factors, such as if it has been advertised for sale, embedded in a pen test tool, or used by a threat actor. These risk factors drive a transparent risk score,supported by the necessary evidence.

Within the portal (or via the API), users can search for CVEs, CPEs, product families and vulnerability aliases to get intelligence on specific areas of interest. 

Key Features 

  • Filter by exploit availability, CVSS vector, threat actor interest, and mitigations. 
  • Intuitive dashboard with rich CVE profiles 
  • Full access to finished cyber threat intelligence associated with CVEs
  • Related intelligence, curated by Digital Shadows Research Team
  • Accessible via API or cloud-based portal

Get Started Today

Curious to know more about how SearchLight can help? Schedule a demo to see our new capability in action!

Not ready to talk? Check out our Vulnerability Intelligence Solutions Guide instead.

Vulnerability Intelligence Solutions Guide
Tags: /

Related Blog Posts

The Optus Breach: If I Could Turn Back Time

The Optus Breach: If I Could Turn Back Time

October 5, 2022 | 6 Min Read

The fallout of the recent Optus breach got...
Who’s next in Lapsus$’ crosshairs?

Who’s next in Lapsus$’ crosshairs?

September 26, 2022 | 7 Min Read

You've probably read that our favorite...
Cyber threats to the 2022 Italian elections

Cyber threats to the 2022 Italian elections

September 22, 2022 | 6 Min Read

  When Mario Draghi formed a national unity...