The number of vulnerabilities is growing day by day due to different technologies such Web applications or Cloud Computing, which is increasingly adopted by organizations as well as teleworking, so more assets are exposed and connected to the internet and the attack surface of organizations is getting more and more larger, besides hackers have shifted their focus from high to medium and low CVSS.
Traffic Light Protocol (TLP) had a change of colours
A word on FIRST
FIRST is the Forum of Incident Response and Security Teams. Since 1990, when FIRST was founded, its members have resolved an almost continuous stream of security-related attacks and incidents including handling thousands of security vulnerabilities affecting nearly all of the millions of computer systems and networks throughout the world connected by the ever growing Internet.
FIRST brings together a wide variety of security and incident response teams including especially product security teams from the government, commercial, and academic sectors.

TLP means Traffic Light Protocol, it is a protocol created by the Special Interest Group of FIRST (FIRST TLP SIG).
Agile threat modeling and the “the devil is in the details” idiom
Disclaimer
This post is based on the following elements:
-
- My experience working as a developer (2003-2015) and then as a full-time Application Security Consultant (2015-present).
- The collection of trainings I have recently followed about Threat Modeling activity.
- My regular technical survey on the Application Security field.
📢 Therefore, it is quite possible that my point of view is wrong in some aspect or biased. In this case, I will be more than happy to get feedback to make my point of view evolve.
Next-Generation Firewalls? Find out now!
Next-Generation Firewalls are the successor of many other firewalls. How do Next-Generation Firewalls work? What about their added value?
In this newsletter, we cover Next-Generation Firewalls from scratch.
Excellium services newsletter : Integrate the security in an Agile project using the Pushing Left approach
In this newsletter, we’ll cope with the Pushing Left approach. What is this approach? Why do we need it?
Let’s start.