The Forum of Incident Response and Security Teams (FIRST) has unveiled CVSS v4.0, marking a significant update to the Common Vulnerability Scoring System (CVSS) after an eight-year gap since CVSS v3.0. CVSS plays a crucial role in evaluating the security of software vulnerabilities by assigning numerical scores or labels, such as low, medium, high, or critical, based on various factors like exploitability and impact. Higher scores indicate more severe vulnerabilities, aiding organizations in prioritizing responses to security threats. CVSS v4.0 introduces several enhancements, including more precise base metrics, reduced ambiguity in scoring, simplified threat metrics, and a better evaluation of security requirements specific to different environments and the effectiveness of compensating controls. Additionally, it brings in extra metrics that encompass aspects like automatability, recovery, value density, response effort, and provider urgency. Furthermore, CVSS v4.0 broadens its scope to encompass operational technology (OT), industrial control systems (ICS), and the Internet of Things (IoT). It incorporates safety metrics into Supplemental and Environmental metrics. A new nomenclature is introduced, featuring severity ratings such as Base (CVSS-B), Base + Threat (CVSS-BT), Base + Environmental (CVSS-BE), and Base + Threat + Environmental (CVSS-BTE). CVSS v4.0 represents a substantial advancement in the field of cybersecurity, providing a more comprehensive tool for assessing and managing vulnerabilities. This reflects FIRST's dedication to enhancing the cybersecurity landscape. For a detailed list of changes in CVSS v4.0, including improved base metrics and impact measurements, please visit FIRST's website.
Medtronic recently disclosed a cybersecurity incident involving unauthorized access to parts of its corporate IT environment. The announcement follows claims by the data extortion ...
As Linux continues to dominate high-performance computing, cloud infrastructure, and Internet of Things (IoT) environments, it has increasingly become a target for cybercriminal ac...
A newly observed malware campaign is using layered delivery techniques and heavy obfuscation to bypass conventional security controls. The attack begins with targeted phishing emai...