- John Hammond
- Posts
- Cybersecurity Shenanigans #011: CVE uncertainty, cybersec training, and a huge thank you š
Cybersecurity Shenanigans #011: CVE uncertainty, cybersec training, and a huge thank you š
This month's cybersecurity scoop.
š Hey friend,
Itās time for Cybersecurity Shenanigans again ā and sheesh, are there shenanigans to cover this month. š
From the cybersec community being lit on fire (even more than usual) to some exciting updates with Just Hacking Training, thereās a lot of ground to cover this month. Letās get right to it!
ā JH

Thank you for 2M š
I reached a pretty significant milestone on YouTube this week: 2 million subscribers. (WHAT?!)
I feel undeserving but very blessed. Thank you for letting me be a part of the industry and community... especially if my content has helped you in your own path.
Honored to have a seat at the table, but more honored to be sitting together with all of you. š
News & Commentary
MITRE funding almost expired, setting the cybersec community ablaze
The big news of the week is that MITREās funding for the Common Vulnerabilities and Exposures (CVE) program was set to expire yesterday, April 16. The news broke earlier this week with the release of the below memo to CVE board members:
With just hours to spare, CISA ultimately extended funding for MITRE for the next 11 months ā but I feel like this is a good time to revisit just why the CVE program is such a critical asset for security researchers and the cybersecurity community as a whole.
What are CVEs?
Every discovered flaw or weakness in cybersecurity is given a sort of āID numberā ā an identifier that helps security researchers remain on the same page when discussing vulnerabilities. It helps us as an industry tactically address and respond to what a problem really is, while making sure weāre addressing the same problem thanks to its unique identifier or CVE. So, CVEs are synonymous with their vulnerabilities.
How do CVEs tie into vulnerability management?
CVEs form the groundwork for vulnerability management. In a typical vulnerability management program, youāll conduct a vulnerability scan, assess those vulnerabilities, prioritize them, and then remediate them. CVEs are the vulnerabilities at play, and those CVEs help security pros identify, define, and prioritize their remediation efforts.
Okay, letās say we donāt have CVEs anymore. Canāt we just remediate vulnerabilities as they arise?
In a perfect world where every security researcher and cybersec pro has endless time, sure. But in reality, no, not really.
Simply stated, in the vast majority of environments, it is unfeasible to address every single vulnerability. You have to pick and choose your battles, and thatās where prioritization comes into play. CVEs help us prioritize vulnerabilities, because they collect and file away information about each vulnerability. If security analyst Bob researches CVE-2025-XXXXX and discovers it can give threat actors remote access, for example, Bob can ring the alarm about this specific CVE to alert the security community.
But hereās where it gets tricky. What serves as an āall-hands-on-deck, red-alertā vulnerability for one company may not be the case for another. For instance, if Company B operates in an air-gapped environment with no internet connectivity, that āall-hands-on-deck, red-alertā vulnerability may actually be a nothing burger for Company B. CVEs help security researchers identify and weigh those risks for their industry and even their specific company ā and in turn, those risks can be handled appropriately, depending on the organization and its unique environment.
Another analogy: CVEs are like caring for different wounds in the ER. While a scrape warrants a simple bandage, a third-degree burn requires immediate, specialized care. CVEs help us identify which vulnerabilities are scrapes and which ones are third-degree burns, so we can act accordingly.
What might the aftermath look like if funding isnāt renewed?
Luckily, we donāt have to consider the worst until at least 11 months from now, but itās worth talking about what could happen if funding does dry up.
Frankly, this would be uncharted territory, and itās difficult to say exactly what the aftermath will look like if funding isnāt renewed. We can only make educated guesses at this point.
I try to steer clear of being an alarmist, but my biggest fear is seeing this centralized security database fall apart, leaving security researchers scrambling to pick up the pieces. MITRE plays a vital part in the CVE process ā designating or cutting CVE identifiers ā and the national database and resources we all rely on might just fall apart.
The cybersecurity industry has drastically matured over the last couple of decades. Weāve found that by working together, we get more done. Cybersecurity isnāt as daunting. But if cybersecurity is best played as a team sport, then itās only as good as its community. And without a centralized place for the community to gather and share intel, weāre likely to be more siloed and scrambled. That makes for a much more dangerous world for all of us!
Where should I go to learn more?
Here are a few resources/bits of coverage to learn more:
Sponsor

Take the fear out of phishing response with automation
Did you know that 57% of organizations experience phishing attempts on a weekly or daily basis? For modern security teams, phishing remains one of the most persistent and resource-intensive challenges their organizations face. What can be done about it?
On April 22, join Tines and Material Security for Take the fear out of phishing response: Lessons from Material Security. Youāll learn:
The evolution and current state of phishing attacks
The role of automation and AI in phishing response
Tips for building a phishing-resistant culture in your organization

Email being clipped?
Hereās some actually helpful advice: You can view the email in your browser: https://johnhammond.beehiiv.com/p/cybersecurity-shenanigans-011.
(And as always, thanks for nothing, Clippy. š)
Latest Content
YouTube Videos
// Letās look at some desktops of the exact moment when people got pwned. š |
// Apparently, todayās malware can be a real bop. š¶ |
// Letās dive into a critical vulnerability discovered in the Next.js framework. š¤ |
Just Hacking Training š¤
April Announcements
You Passed Security+⦠Great! Tick that HR box.
But can you pass a technical interview?
The Constructing Defense Path (2025 Edition), with its massive hands-on lab and 100+ videos, is one of the flagship ways to start a career in cybersecurity. At only $400 until April 30, itās a fraction of the cost of other cyber ranges yet more in-depth. Get ready to perform attacks and see what happens from a defensive perspective. Learn. Attack. Defend. Repeat!
Recently Released Bundles:
The āMishaalā Bundle ā All of Mishaal Khanās Training for only $150!
Mastering Active Directory Security (MADS) Volumes 1 ā 3 = 20% Off
Windows Malware Dev (WMD) 1 ā 3 = 20% Off
15% off EVERYTHING!
Use code TaxDay15 for 15% off everything on JHT
Yes⦠includes already discounted courses & bundles!
Expires Midnight ET on April 30
Additional Releases:
Name Your Price Hack-Along - M!$#'s geoINT Challenge by Mishaal Khan
Free UC - Phishing by Cori Macy
Free UC - Windows Internals by Shikata
Free UC - Windows Administration by Patrick Gorman
Free UC - Threat Landscape Reports (TLRs) by Jennifer Funk
With new content released twice a month throughout 2025, bi-monthly livestreams with our experts and even some āName Your Priceā options, JHT provides "Focused Technical Training for All Levels" to advance your career regardless of experience level or budget.
Come hang out with us hackers in Discord and engage with me, our All-Star instructors, students, and the rest of our community.
they call me mr. one take jake
ā John Hammond (@_JohnHammond)
8:35 AM ⢠Apr 15, 2025
Dear diary,
Today, all my meetings were cancelled.
It was glorious.
I actually got something done.xoxo, John
P.S., I'll write again on Saturday, because I won't have time tomorrow or the next day or the one after that (sorry, meeting-marathon! xoxo šš)
ā John Hammond (@_JohnHammond)
11:57 PM ⢠Apr 7, 2025
Got feedback?
Weāre 10 11 issues into this newsletter, and Iād love to check in with you: Is this thing helpful? Mildly entertaining? Awkward?
I canāt promise to make it less awkward, but I would love your ideas on how to make it more entertaining and helpful as a resource.
Please reply to this email and let me know what youāre loving ā and what youād like to see in this thing.
Thank you!
Social