
Trending vulnerabilities,
we do the research so you don’t have to.
Powered by Recorded Future Precision Intelligence and expert analysis from the security researchers of Insikt Group®, we help teams stay ahead of the ever-evolving threat landscape with the latest insights on trending software vulnerabilities.
Latest analysis
Threats that matter today.
With new vulnerability threats emerging every day, we surface the most critical and widespread threats for cyber security teams to know what matters most.
Insikt Group® Research
With deep experience in government, law enforcement, military, and intelligence agencies, the analysts and security researchers of Insikt Group® power the Recorded Future Platform with analytics insights.


Enable proactive defense with Recorded Future.
With several tools and products available to mitigate risk, our customers can understand the severity, availability, and complexity of a vulnerability. Get contextualized intelligence and hands-on support to quickly make confident decisions, fix the gaps, and prevent attacks.


Need help building the best risk mitigation solution to meet your company’s unique needs?
Our team of security and intelligence professionals can help. We equip your team with strategies for identifying, prioritizing, and mitigating threats effectively. With our Vulnerability Analysis Service, we help you find the right technologies and operations essential for a successful vulnerability management program.
See what our customers are saying.
Vulnerability Intelligence has helped us prioritize action on Zero-Day vulnerabilities by providing context around exploit prevalence and real-world activity. Having intelligence to back the urgency of a threat allows us to make better-informed decisions and justify accelerated remediation when necessary.
Director, Information Security
North American Financial Institution
By utilizing Attack Surface Intelligence, we gain a detailed understanding of our external digital footprint. This helps us to uncover and remediate vulnerabilities, misconfigurations, and other exposure points that could be exploited by adversaries, thereby strengthening our overall security posture.
Maksym G, Cyber Security Architect
UK Technology Company
We identified a third party with weak security hygiene, including outdated software and high vulnerability exposure, leading us to reconsider their role in our supply chain. These proactive steps have allowed us to mitigate potential risks and protect our organization from vulnerabilities associated with third-party relationships.
Associate Manager
Fortune 500 Food & Staples Retailing Company
FAQs
Your questions, answered.

What is a CVE identifier?
A CVE identifier, or CVE ID, is a unique code assigned to a vulnerability or exposure, facilitating the easy disclosure and reference of exploited vulnerabilities. It fosters a unified approach to addressing cybersecurity vulnerabilities.
Does every vulnerability have a CVE?
Not every vulnerability receives a CVE ID. A vulnerability only becomes a CVE after being publicly disclosed and assigned an ID by a CNA, adhering to CNA rules. Vulnerabilities in less prevalent or smaller vendor software may not be assigned a CVE.
How does a vulnerability become a CVE?
A vulnerability is designated as a CVE through a process of disclosure to a CVE Numbering Authority (CNA), which evaluates its exploits, impact, and significance. If considered critical, it's assigned a CVE ID, thus becoming one CVE and is cataloged for tracking and mitigation. This systematic process is crucial for addressing exploited vulnerabilities.
What’s the difference between CVE and CVSS?
CVE provides a unique identifier for vulnerabilities or exposures, whereas CVSS offers a scoring system to assess a vulnerability's severity. This scoring, ranging from 0 to 10, aids in determining the impact and urgency of exploited vulnerabilities, complementing CVE information for prioritization in vulnerability management.