Need urgent help with a breach? Call our team on 0207 183 9022

How Can We Help?
< All Topics

More often than not, vulnerabilities are discovered by cross-referencing the findings of a scan or penetration test with a list of common vulnerabilities and exposures (CVEs). A cyber security analyst will also consult open source knowledge bases and use their own experience, for example when software is known to no longer receive support or development (end of life).

Previous Can vulnerabilities be prevented?
Next How do you do a vulnerability assessment?
Table of Contents
Back to top