Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Vulnerability Exploitation Probability Metric Proposed by NIST, CISA Researchers 

Posted on May 20, 2025May 20, 2025 By CWS

Researchers from CISA and NIST have proposed a brand new cybersecurity metric designed to calculate the probability {that a} vulnerability has been exploited within the wild. 

Peter Mell of NIST and Jonathan Spring of CISA have printed a paper describing equations for what they name Possible Exploited Vulnerabilities, or LEV. 

Hundreds of vulnerabilities are found yearly in software program and {hardware}, however solely a small proportion are ever exploited within the wild. 

Realizing which vulnerabilities have been exploited or predicting which flaws are more likely to be exploited is vital for organizations when making an attempt to prioritize patching. 

Identified Exploited Vulnerabilities (KEV) lists such because the one maintained by CISA and the Exploit Prediction Scoring System (EPSS), which depends on information to estimate the likelihood {that a} vulnerability will likely be exploited, will be very helpful. Nevertheless, KEV lists could also be incomplete and EPSS could also be inaccurate.

LEV goals to boost — not exchange — KEV lists and EPSS. That is accomplished by equations that keep in mind variables equivalent to the primary date when an EPSS rating is offered for a specified vulnerability, the date of the newest KEV listing replace, inclusion in KEV, and the EPSS rating for a given day (measured throughout a number of days).

LEV possibilities will be helpful for measuring the anticipated quantity and proportion of vulnerabilities that menace actors have exploited. 

It may also be helpful for estimating the comprehensiveness of KEV lists. “Beforehand, KEV maintainers had no metric to display how shut their listing was to together with all related vulnerabilities,” the researchers defined.Commercial. Scroll to proceed studying.

As well as, LEV possibilities can assist increase KEV- and EPSS-based vulnerability remediation prioritization — within the case of KEV by figuring out higher-probability vulnerabilities which may be lacking, and within the case of EPSS by discovering vulnerabilities which may be underscored.

Whereas in concept LEV might grow to be a really great tool for vulnerability prioritization, the researchers identified that collaboration is important, and NIST is in search of business companions “with related datasets to empirically measure the efficiency of LEV possibilities”.

Associated: Exploitation Lengthy Identified for Most of CISA’s Newest KEV Additions

Associated: Essential Vulnerability in AI Builder Langflow Beneath Assault

Associated: CISA Warns of Exploited Broadcom, Commvault Vulnerabilities

Security Week News Tags:CISA, Exploitation, Metric, NIST, Probability, Proposed, Researchers, Vulnerability

Post navigation

Previous Post: Event Preview: 2025 Threat Detection & Incident Response (Virtual) Summit
Next Post: AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation

Related Posts

Guardz Banks $56M Series B for All-in-One SMB Security Security Week News
Google Project Zero Tackles Upstream Patch Gap With New Policy Security Week News
Ransomware Attack Forces Kettering Health to Cancel Procedures Security Week News
Armis Raises $435 Million in Pre-IPO Funding Round at $6.1 Billion Valuation Security Week News
Oracle Patches EBS Vulnerability Allowing Access to Sensitive Data Security Week News
$1 Million Offered for WhatsApp Exploit at Pwn2Own Ireland 2025 Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark