Late last week, all of us were made aware of Chrome zero day ( CVE-2019-5786 ), “use after free in FileReader resulting in remote code execution“. This had a published exploit in the wild making it absolutely critical to patch without any delay.

Users of ThreatWatch were not only notified of this intelligence but also got notification of the specific assets / golden images that needed to be patched based on the chrome version they had installed, all in real time without ever running a scan.


This is how the future of vulnerability impact detection looks like and we are glad that ThreatWatch kept users updated and safe. Another validation of the approach that ThreatWatch brings to the field and why organizations need to think beyond conventional scanning approach. Time to think differently is here !

Leave a Reply

Your email address will not be published. Required fields are marked *