Vulnerability management activities will need to shift into a higher gear in response to the growing usage of AI tools for ...
A critical CrushFTP vulnerability now under exploitation in the wild has become mired in controversy and confusion. On March 31, the Shadowserver Foundation reported that exploitation activity was ...
The UK’s financial regulators have scrapped plans to mandate that “critical third party” (CTP) organizations disclose new software vulnerabilities to them. The decision was taken in response to ...
The Homeland Security Department is seeking feedback on an enterprisewide vulnerability disclosure program that will make it easier for the public to report weaknesses in the agency’s IT ...
Vulnerabilities are lurking everywhere, like hidden landmines in the digital landscape waiting to be stepped on. As technology advances, so does the rate of vulnerability disclosures and the speed ...
In 2023, there were more than 23,000 vulnerabilities discovered and disclosed. While not all of them had associated exploits, it has become more and more common for there to be a proverbial race to ...
Cisco warns CVE-2026-20122 and CVE-2026-20128 in Catalyst SD-WAN Manager are actively exploited; patches released across multiple software versions.
One initiative, the Hacking Policy Council, will bring together a group of “like-minded organizations and leaders” to advocate for new policies and regulations to support best practices for ...
The Department of Defense Cyber Crime Center, known as the DC3, is expanding to address the increase in cyber attacks and vulnerabilities. The DC3’s Vulnerability Disclosure Program is expanding ...
The European Union Agency for Cybersecurity (Enisa) has debuted a European Union Vulnerability Database (EUVD) to provide “aggregated, reliable and actionable” information on newly disclosed cyber ...
Trend MicroTM Zero Day InitiativeTM (ZDI) is a cybersecurity secret weapon Omdia provided an independent comparative analysis of 9 global vendors/organizations that publicly research and disclose ...
Cybersecurity products should incorporate robust security at all stages of the product lifecycle and a cybersecurity vendor should offer continuous innovation and improvement over the product’s ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results