Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Vulnerability Exploitation Probability Metric Proposed by NIST, CISA Researchers 

Posted on May 20, 2025May 20, 2025 By CWS

Researchers from CISA and NIST have proposed a brand new cybersecurity metric designed to calculate the probability {that a} vulnerability has been exploited within the wild. 

Peter Mell of NIST and Jonathan Spring of CISA have printed a paper describing equations for what they name Possible Exploited Vulnerabilities, or LEV. 

Hundreds of vulnerabilities are found yearly in software program and {hardware}, however solely a small proportion are ever exploited within the wild. 

Realizing which vulnerabilities have been exploited or predicting which flaws are more likely to be exploited is vital for organizations when making an attempt to prioritize patching. 

Identified Exploited Vulnerabilities (KEV) lists such because the one maintained by CISA and the Exploit Prediction Scoring System (EPSS), which depends on information to estimate the likelihood {that a} vulnerability will likely be exploited, will be very helpful. Nevertheless, KEV lists could also be incomplete and EPSS could also be inaccurate.

LEV goals to boost — not exchange — KEV lists and EPSS. That is accomplished by equations that keep in mind variables equivalent to the primary date when an EPSS rating is offered for a specified vulnerability, the date of the newest KEV listing replace, inclusion in KEV, and the EPSS rating for a given day (measured throughout a number of days).

LEV possibilities will be helpful for measuring the anticipated quantity and proportion of vulnerabilities that menace actors have exploited. 

It may also be helpful for estimating the comprehensiveness of KEV lists. “Beforehand, KEV maintainers had no metric to display how shut their listing was to together with all related vulnerabilities,” the researchers defined.Commercial. Scroll to proceed studying.

As well as, LEV possibilities can assist increase KEV- and EPSS-based vulnerability remediation prioritization — within the case of KEV by figuring out higher-probability vulnerabilities which may be lacking, and within the case of EPSS by discovering vulnerabilities which may be underscored.

Whereas in concept LEV might grow to be a really great tool for vulnerability prioritization, the researchers identified that collaboration is important, and NIST is in search of business companions “with related datasets to empirically measure the efficiency of LEV possibilities”.

Associated: Exploitation Lengthy Identified for Most of CISA’s Newest KEV Additions

Associated: Essential Vulnerability in AI Builder Langflow Beneath Assault

Associated: CISA Warns of Exploited Broadcom, Commvault Vulnerabilities

Security Week News Tags:CISA, Exploitation, Metric, NIST, Probability, Proposed, Researchers, Vulnerability

Post navigation

Previous Post: Event Preview: 2025 Threat Detection & Incident Response (Virtual) Summit
Next Post: AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation

Related Posts

Chipmaker Patch Tuesday: Intel, AMD, Arm Respond to New CPU Attacks Security Week News
Suspected DoppelPaymer Ransomware Group Member Arrested Security Week News
‘EchoLeak’ AI Attack Enabled Theft of Sensitive Data via Microsoft 365 Copilot Security Week News
Dutch Intelligence Agencies Say Russian Hackers Stole Police Data in Cyberattack Security Week News
Cisco Patches High-Severity DoS, Privilege Escalation Vulnerabilities Security Week News
Whole Foods Distributor United Natural Foods Hit by Cyberattack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Identify and Block Malvertising
  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Identify and Block Malvertising
  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News