8 Vulnerability Dashboard examples used by customers

Threat Intelligence8 Vulnerability Dashboard examples used by customersCustomization filters and display optionsFeedly’s Vulnerability Dashboard enables you to filter CVEs easily to create a view that meets your intelligence requirements or risk criteria.Filters are created using boolean logic (AND/OR/NOT) against different attributes.The dashboard columns can also be customized to display the most helpful information in your preferred order.Here are eight examples of personalized dashboards showcasing different intelligence requirements.Try The Vulnerability DashboardExample 1: What are the latest high-risk CVEs in my tech stack?Most organizations want to know about the high-risk CVEs affecting their environment. With Feedly, you can create a custom list of your vendors and products and apply it to the dashboard filters.This Vulnerability Dashboard view shows recent CVEs that have either been exploited, weaponized, or have a proof of concept, plus a high CVSS score, whether actual or estimated by Feedly AI. Finally, it’s filtered to a custom list of vendors and products representing your environment.Dashboard filtered to show the latest high-risk CVEs related to their tech stack (vendors and products).Example 2: What are the most recent highs or anticipated highs?Many organizations want to see the newest vulnerabilities with high CVSS scores or are anticipated to have a high CVSS score. To help with anticipated highs, Feedly AI extracts data from articles and uses AI models to estimate and aggregate the predicted scores. The result is the CVSS Estimate, calculated immediately upon learning about the CVE, to give you a triage mechanism when no CVSS score has been assigned.Dashboard filtered to show CVES with new high CVSS or high CVSS estimated scores Example 3: What CVEs are weaponized or exploited through different attack vectors?You can identify the CVEs that are exploited through network, physical, local, and adjacent network attack vectors. We’ve showcased those exploited by the Network attack vector in the following Vulnerability Dashboard view to help you identify paths an adversary can use to attack your assets remotely.Dashboard showing exploited or weaponized CVEs targeted through the network attack vector.Example 4: What CVEs have been trending in the threat landscape over the past week?Shadow IT and supply chain partners may expose your organization to vulnerabilities outside your known tech stack. This Vulnerability Dashboard view can help you monitor trending and potentially risky CVEs.Dashboard filtered to show high-risk CVEs (high CVSS or CVSS Estimates) that are trending in the newsExample 5: What vulnerabilities are targeted by threat actors on my watchlist?If you face difficulties getting IT to prioritize remediation efforts, this dashboard helps identify vulnerabilities threat actors are actively exploiting. The list can also be exported and used to inform threat hunts or to help update threat actor profiles. You can open the related Threat Actor Insights Card from any threat actors listed in the table.Dashboard filtered to show exploited CVEs that have been targeted by threat actorsExample 6: What vulnerabilities are exploited by specific malware or ransomware?Some teams like to understand which vulnerabilities are exploited by malware (including ransomware). Here, you can see the CVEs related to Ransomware or New Malware, and within the table, select any malware to launch a Malware Insights Card.Vulnerability Dashboard showing filtered to CVEs that have been exploited by malware, including ransomwareExample 7: Which weaponized vulnerabilities are not detected by our scanner?Many vulnerability teams rely on scanners like Qualys and Nessus to detect vulnerable systems. It’s important to know which weaponized CVEs are not yet detectable by the scanners.Vulnerability Dashboard is filtered to show weaponized CVEs that are not yet detectable by the Qualys scannerExample 8: What vulnerabilities don’t yet have available patches?Last but certainly not least, many analysts want to keep tabs on the critical CVEs that don’t yet have patches. Use the NOT filter in the Vulnerability Dashboard to exclude CVEs with patches, revealing only those that don’t. You can also see which of these CVEs have been exploited to help identify potential zero days.The Vulnerability Dashboard showing critical CVEs that don’t yet have available patches. The Vulnerability Dashboard is available in the Feedly Threat Intelligence product.Start customizing your Vulnerability DashboardCreate personalized Dashboards to monitor the CVEs you most care aboutStart Free Trial
Source: Internet Gov forum

Leave a Reply