Get Started with AllBlue Defense

Log in to use the Dashboard, which helps you stay current on exploited vulnerabilities that match your stack.
Quick Answers
How does this help me?
The AllBlue Dashboard shows you exploited vulnerabilities, some of which will matter to you simply because of the products you use.
This awareness lets you act as quickly as attackers do.
Subscribe to the vendors and products you care about, and when a matching exploit appears, you'll see an alert.
Why pay attention to KEVs?
A vulnerability becomes dangerous when exploitation is practical and repeated at scale.
The CISA Known Exploited Vulnerabilities catalog is valuable because it focuses attention on vulnerabilities with known exploitation rather than every disclosed CVE.
The KEV catalog is here: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
How exploitation becomes impact
Most real-world incidents follow a predictable arc.
The goal is to shorten that window for the parts of your stack that matter most.
- New vulnerability information becomes public.
- Exploit techniques spread quickly through write-ups, tooling, automation and AI.
- Attackers scan broadly for vulnerable targets.
- Breaches happen during the window between awareness and remediation.
- Learn about disclosures that affect you on day one, not when others are breached. Protect yourself before attacks scale.
Key terms
Vulnerability vs Weakness
A Vulnerability (vuln for short) is a specific flaw in a specific product (tracked by CVE). A weakness is a broader category of flaw that can appear across many products (tracked by CWE). KEVs are vulnerabilities that are known to be exploited, not weaknesses.
Exploit
Code or technique that takes advantage of a vulnerability to compromise a system.
Remediation
The process of fixing or mitigating a vulnerability (patching, configuration changes, or reducing exposure).
KEV
Known Exploited Vulnerability. A curated vulnerability list based on known exploitation. CISA KEV catalog: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
CVE
A standardized identifier for a vulnerability. CVE program: https://www.cve.org/
CWE
A classification system for weakness types. Useful for prevention and analysis, but broader than a specific exploited vulnerability. CWE: https://cwe.mitre.org/
CISA
CISA is the U.S. agency that publishes cybersecurity guidance and maintains the KEV catalog. CISA homepage: https://www.cisa.gov/
NVD
The National Vulnerability Database provides vulnerability data tied to CVEs. NVD: https://nvd.nist.gov/
Using the AllBlue Dashboard
- Create an account at /signup.
- Browse the dashboard to see recently exploited KEVs. Click any KEV to view details—if it affects you, subscribe to that vendor or product right there.
- Go to Subscriptions to see everything you're tracking and add more. Browse popular tags or search for what you use.
- Enable email alerts in settings to get notified when matching KEVs are added.
- Use favorites and notes to preserve triage decisions and track status over time.
Triage guide
When a matching KEV appears, triage immediately and capture the decision.
- Step 1: Confirm usage. Identify whether the affected product and version exists in your environment.
- Step 2: Evaluate exposure. Prioritize anything internet-facing or reachable from untrusted networks.
- Step 3: Choose the response. Patch, mitigate, reduce exposure, or mark as not affected.
- Step 4: Assign ownership and timeframe. Route to the responsible team and set a target date.
- Step 5: Preserve context. Record the decision in notes with the minimum necessary detail to avoid repeat triage.
Best practices
- Maintain an inventory of critical vendors and products.
- Treat exploited vulnerabilities as a priority signal, not a background feed.
- If you can't patch immediately, reduce risk by limiting who can reach the vulnerable system.
- Write notes that capture the decision and the reason in one or two sentences.
Limitations
A match means the vulnerability is relevant to a vendor or product subscription. It does not confirm impact.
You still validate versions, configuration, and exposure in your own environment.