On the opening day of the Pwn2Own Automotive 2026 competition, security researchers revealed a reality that many technology ...
A critical CrushFTP vulnerability now under exploitation in the wild has become mired in controversy and confusion. On March 31, the Shadowserver Foundation reported that exploitation activity was ...
Vulnerability management activities will need to shift into a higher gear in response to the growing usage of AI tools for ...
The Homeland Security Department is seeking feedback on an enterprisewide vulnerability disclosure program that will make it easier for the public to report weaknesses in the agency’s IT ...
The UK’s financial regulators have scrapped plans to mandate that “critical third party” (CTP) organizations disclose new software vulnerabilities to them. The decision was taken in response to ...
Vulnerabilities are lurking everywhere, like hidden landmines in the digital landscape waiting to be stepped on. As technology advances, so does the rate of vulnerability disclosures and the speed ...
Cisco warns CVE-2026-20122 and CVE-2026-20128 in Catalyst SD-WAN Manager are actively exploited; patches released across multiple software versions.
In 2023, there were more than 23,000 vulnerabilities discovered and disclosed. While not all of them had associated exploits, it has become more and more common for there to be a proverbial race to ...
Trend MicroTM Zero Day InitiativeTM (ZDI) is a cybersecurity secret weapon Omdia provided an independent comparative analysis of 9 global vendors/organizations that publicly research and disclose ...
The Department of Defense Cyber Crime Center, known as the DC3, is expanding to address the increase in cyber attacks and vulnerabilities. The DC3’s Vulnerability Disclosure Program is expanding ...
The European Union Agency for Cybersecurity (Enisa) has debuted a European Union Vulnerability Database (EUVD) to provide “aggregated, reliable and actionable” information on newly disclosed cyber ...
Cybersecurity products should incorporate robust security at all stages of the product lifecycle and a cybersecurity vendor should offer continuous innovation and improvement over the product’s ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results