Join SAFE at FAIRCON25 - Resetting Cyber Risk in the Age of AI.
Learn More
Platform
Platform
SAFE One Platform
Integrations Marketplace
Products
Cyber Risk Quantification (CRQ)
Continuous Threat Exposure Management (CTEM)
Third-Party Risk Management (TPRM)
SAFE AI Agents
Public Records
Contract Intelligence
Fourth-Party
Outside-In
Threat Intel
All Agents
Featured Datasheet
Read now
SAFE One Datasheet
Solutions
Cyber Risk Quantification (CRQ)
Top Risk Reporting
Benchmarking
Budget Justification
Executive Board Reporting
Operational Prioritization
Regulatory Risk Requirements
GenAI Cyber Risk Management
Third-Party Risk Management
Intake and Onboarding
Risk Assessment
Continuous Monitoring
Dashboards and Reporting
By Vertical
Financial
Health Care
Technology
Retail
By Persona
CISO
Cyber Risk Officer
TPRM Leader
Customers
Customer Stories
Victoria's Secret
Max Healthcare
Shelter Insurance
Booz Allen
ISO New England
Main Line Health
...More
Customer Highlight
Read now
IHG: Success Story
Customer Highlight
Read now
Booz Allen: Success Story
Partners
Partners
Partner Programs
Partner Academy
Deal Registration
Featured Whitepaper
Read now
Top 5 CISO Priorities in 2025
Featured Datasheet
Read now
SAFE CTEM Datasheet
FAIR
The FAIR Institute
FAIR-MAM
FAIR-CAM
FAIR-TAM
Featured Resource
Read now
How Material is That Hack?
Featured Event
Read now
Join SAFE at FAIRCON25
Why SAFE?
SAFE vs Legacy CRQ
SAFE vs. Axio
SAFE vs. KPMG
SAFE vs. ThreatConnect
SAFE vs. Balbix
SAFE vs. CYE
SAFE vs Legacy TPRM
SAFE vs. BitSight
SAFE vs. Whistic
SAFE vs. Archer
SAFE vs. Hyperproof
Customer Highlight
Read now
IHG: Success Story
Customer Highlight
Read now
The Forrester WaveTM For CRQ, 2025
Resources
All Resources
Analyst Reports
Blog
CISO Confidential Podcast
Customer Stories
Cyber Risk Podcast
All Resources
Datasheets
Events
Press Releases
Reports-Research
Webinars
Whitepapers
Featured Podcast
Watch now
CISO Confidential
Featured Podcast
Watch now
The Cyber Risk Podcast
Company
About SAFE
Contact Us
Newsroom
Careers
24
Featured Resource
Read now
$70 Million Series C Funding
Featured Blog Post
Read now
Meet CyberAGI
Featured Datasheet
Read now
SAFE One Datasheet
Schedule Demo
Reports-Research
All
Analyst Reports
Blog
Customer Stories
Datasheets
Events
Reports-Research
Webinars
Whitepapers
Filter
Community
Culture
Customer Stories
Engineering
Events
News
Podcasts
Product Updates
Trends
Reports-Research
Oct 03,2025
Investment Return of Autonomous Third-Party Risk Management from SAFE
Reports-Research
Jul 08,2025
FAIR Institute's 2025 State of Cyber Risk Management
Reports-Research
Feb 26,2025
Risk Radar Report - February 2025
Reports-Research
Aug 05,2022
Microsoft Exchange Server-Side Forgery Request (Proxylogin)
Reports-Research
Jul 08,2022
“Dirty Pipe” Linux Local Privilege Esacalation [CVE-2022-0847]
Reports-Research
Jun 24,2022
Critical RCE Vulnerability in F5 BIG-IP [CVE-2022-26352]
Reports-Research
Jun 17,2022
Critical RCE in dotCMS Content Management Software
Reports-Research
Jun 10,2022
AWS Lambda Command Injection
Reports-Research
May 27,2022
PwnKit: Local Privilege Escalation Vulnerability
Reports-Research
May 16,2022
Exploitation of Spring4shell in the Wild
Reports-Research
Dec 21,2021
WordPress LiteSpeed Cache Vulnerability [CVE-2020-29172]
Reports-Research
Dec 10,2021
Microsoft MSHTML Remote Code Execution [CVE-2021-40444]
Reports-Research
Nov 24,2021
PrintNightmare Vulnerability [CVE 2021-1675 & CVE-2021-34527]
Reports-Research
Nov 24,2021
CVE 2021-42013 - Recent Vulnerabilities in Apache HTTP Server
Reports-Research
Oct 01,2021
OWASP Top 10 Web Application Security Threats and Standards
Reports-Research
Oct 01,2021
Polkit Authentication Bypass Local Privesc Vulnerability
Reports-Research
Oct 01,2021
CurveBall - CryptoAPI Spoofing Vulnerability [CVE-2020-0601]
Reports-Research
Aug 27,2021
HiveNightmare aka Serious SAM [CVE 2021-36934]
Reports-Research
Aug 18,2021
Android 11 PIP Vulnerability
Reports-Research
Jul 18,2021
Detecting and Protecting your Smartphone from Pegasus Spyware
Reports-Research
Jun 16,2021
XML External Entity Injection via MP3 File Upload on WordPress
Reports-Research
Jun 16,2021
Spoofing Downloaded Filename’s Extension in Chromium
Reports-Research
Jun 03,2021
Android Vulnerability in ES File Explorer
Reports-Research
Jun 03,2021
CMS Made Simple Exploit Explained [CVE-2020-10682 | CVSS 6.8]
Reports-Research
Jun 03,2021
Chrome Browser FileReader (UAF) Vulnerability
Reports-Research
Jun 03,2021
Heap-Based Overflow Vulnerability in Sudo [CVE-2021-3156]
Reports-Research
Jun 03,2021
Ubuntu OverlayFS Local Privesc Vulnerability
Reports-Research
Jun 03,2021
windows-win32k-elevation-of-privilege-vulnerability/
Reports-Research
Apr 06,2021
A Beginners Guide to Linux Firewall
Reports-Research
Apr 05,2021
Heartbleed Attack - What it is and How Does it Work?
Reports-Research
Apr 05,2021
Injection Attacks Analysis: SQL Injection, Host Header, and more
Reports-Research
Apr 05,2021
Introduction to Insecure Deserialization
Reports-Research
Apr 05,2021
A Hands-on Approach to Linux Privilege Escalation
Reports-Research
Apr 05,2021
Deep Insight into Social Engineering
Reports-Research
Apr 05,2021
Understanding and Exploiting Zerologon
Reports-Research
Mar 24,2021
SMBGhost CVE 2020-0796
Reports-Research
Mar 24,2021
URL Exploiting XXE to SSRF
Reports-Research
Mar 03,2021
Apache GhostcatCVE 2020-1938
Reports-Research
Aug 19,2016
Blind SSRF with Shellshock Exploitation
See SAFE CRQ in Action
Schedule Demo