You can use repository security advisories to privately discuss, fix, and publish information about security vulnerabilities in your public repository.| GitHub Docs
Learn about the importance of CISA's Known Exploited Vulnerability (KEV) catalog and how to use it to help build a collective resilience across the cybersecurity community.| Cybersecurity and Infrastructure Security Agency CISA
2023 marked another year of record growth in CVE data, and I thought it fitting to kick off the new year by delving into these statistics and showcasing some of the more interesting data points. | JerryGamblin.com
Over two days in late September, attack surface management teams, incident responders, data scientists, and vulnerability management practitioners gathered in Cardiff, Wales.| FIRST — Forum of Incident Response and Security Teams