Vulnerability


  • A close-up digital illustration portrays cybersecurity with a futuristic theme
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    WatchGuard warns critical flaw in Firebox devices facing exploitation

    The company said the threat activity is part of a larger campaign against edge devices and internet-exposed infrastructure.

    By Updated Dec. 23, 2025
  • A logo sits illuminated outside the Cisco booth at the SK telecom booth on day 1 of the GSMA Mobile World Congress on February 28, 2022 in Barcelona, Spain.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    China-linked hackers exploit insecure setting in Cisco security products

    The company urged customers to immediately reconfigure affected products.

    By Dec. 18, 2025
  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    Retrieved from R. Eskalis/NIST.
    Image attribution tooltip

    NIST adds to AI security guidance with Cybersecurity Framework profile

    Organizations have a new resource to map AI considerations onto NIST’s most famous security blueprint.

    By Dec. 17, 2025
  • Fortinet office in Nepean, Canada.
    Image attribution tooltip
    iStock Editorial / Getty Images Plus via Getty Images
    Image attribution tooltip

    FortiGate devices targeted with malicious SSO logins

    Researchers discovered threat activity less than a week after Fortinet disclosed critical vulnerabilities in multiple products.

    By Dec. 17, 2025
  • Cyber security is compromised
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    React2Shell attacks expand widely across multiple sectors

    Researchers warn that state-linked and opportunistic actors are working to exploit flaws in React’s application tools.

    By Dec. 16, 2025
  • Programming code on black screen, green text
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    React issues new patches after security researchers flag additional flaws

    Researchers warn that critical infrastructure providers and government sites are being targeted by state-linked attackers.

    By Dec. 12, 2025
  • A close-up digital illustration portrays cybersecurity with a futuristic theme
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    React Server Components crisis escalates as security teams respond to compromises

    Suspected North Korean actors target users with fake IT recruitment scheme.

    By Dec. 10, 2025
  • Pools of water are seen in an aerial photo of a wastewater treatment plant
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Pro-Russia hacktivists launching attacks that could damage OT

    The U.S. and its allies warned that defenders should take the hackers seriously, despite the attackers’ pattern of exaggerating their actual impact.

    By Dec. 10, 2025
  • Programming code on black screen, green text
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    State-linked groups target critical vulnerability in React Server Components

    China-nexus threat groups have already begun targeting the flaw, creating widespread risk as nearly 40% of cloud environments are potentially impacted.

    By Updated Dec. 7, 2025
  • A man stands and points at a series of monitors on a desk as another man sits in front of the monitors at the desk
    Image attribution tooltip
    Brandon Bell via Getty Images
    Image attribution tooltip

    US, allies urge critical infrastructure operators to carefully plan and oversee AI use

    New guidance attempts to temper companies’ enthusiasm for the latest exciting technology.

    By Dec. 4, 2025
  • security operations center analysts monitoring cyber threats
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Critical vulnerabilities found in React and Next.js

    Researchers warn the flaws can be easily leveraged to achieve full remote code execution.

    By Dec. 4, 2025
  • Fortinet office in Nepean, Canada.
    Image attribution tooltip
    iStock Editorial / Getty Images Plus via Getty Images
    Image attribution tooltip

    Fortinet FortiWeb flaws found in unsupported versions of web application firewall

    Security researchers raise new concerns after the company previously failed to issue prompt security guidance.

    By Dec. 2, 2025
  • The Microsoft pavilion stands at the 2025 Hannover Messe industrial trade fair on March 31, 2025 in Hanover, Germany.
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Microsoft tightens cloud login process to prevent common attack

    Hackers have spent decades exploiting a ubiquitous type of vulnerability. Microsoft is trying to change that.

    By Nov. 26, 2025
  • SolarWinds
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    SEC drops civil fraud case against SolarWinds

    Cybersecurity and legal experts considered the case a potential precedent-setter for risk disclosure.

    By Nov. 20, 2025
  • Fortinet office in Nepean, Canada.
    Image attribution tooltip
    iStock Editorial / Getty Images Plus via Getty Images
    Image attribution tooltip

    Researchers warn command injection flaw in Fortinet FortiWeb is under exploitation

    The medium severity vulnerability can be chained together with a critical flaw in the same product, which could help attackers gain additional capabilities.

    By Nov. 20, 2025
  • An automated automotive assembly line in a factory
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Hackers increasingly target operational technology, with manufacturing sector bearing the brunt

    Companies should segment and monitor their networks to prevent hackers from crossing over from IT to OT, a new report said.

    By Nov. 18, 2025
  • Programming code on black screen, green text
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Critical vulnerability in Fortinet FortiWeb is under exploitation

    The company faces criticism as multiple researchers claim a silent patch was issued weeks before official guidance was released.

    By Nov. 17, 2025
  • Person in subway station
    Image attribution tooltip
    Permission granted by Lenovo
    Image attribution tooltip
    Sponsored by Lenovo and SentinelOne

    AI-driven dynamic endpoint security is redefining trust

    Network perimeters are gone. Modern security solutions must be proactive, dynamic and intelligent.

    By Nima Baiati, Executive Director and General Manager, Commercial Software & Security Solutions, Lenovo • Nov. 17, 2025
  • The FBI seal
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    Akira engaged in ransomware attacks against critical sectors

    The group has stepped up threat activity by abusing edge devices and other tools, reaping hundreds of millions of dollars in illicit gains.

    By Updated Nov. 14, 2025
  • cybersecurity, matrix, abstract
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Sophisticated threat actor targeting zero-day flaws in Cisco ISE and Citrix

    Hackers use custom malware to access multiple vulnerabilities, researchers from Amazon warn.

    By Nov. 12, 2025
  • AI Artificial Intelligence technology for data analysis
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Shadow AI is widespread — and executives use it the most

    Employees in fields like health care and finance trust AI more than they trust their colleagues, according to a new report.

    By Nov. 12, 2025
  • Cisco logo at a conference in Barcelona Spain on Feb. 28, 2022
    Image attribution tooltip
    David Ramos via Getty Images
    Image attribution tooltip

    Cisco detects new attack variant targeting vulnerable firewalls

    Hackers may be able to overload unpatched devices, the company said.

    By Nov. 10, 2025
  • symbol of danger
    Image attribution tooltip
    Permission granted by 10KMedia
    Image attribution tooltip
    Sponsored by 10KMedia

    Your AI-driven threat hunting is only as good as your data platform and pipeline

    The data-centric foundation for modern threat hunting.

    By Taylor Smith, Director of Product Marketing at Exaforce • Nov. 6, 2025
  • A logo sits illuminated outside the Cisco booth at the SK telecom booth on day 1 of the GSMA Mobile World Congress on February 28, 2022 in Barcelona, Spain.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Hackers targeting Cisco IOS XE devices with BadCandy implant

    Security researchers and Australian authorities warn that exploitation activity is ongoing.

    By Updated Nov. 5, 2025
  • Exterior view of Microsoft's Vancouver office in Canada on December 22, 2023.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Researchers warn of flaws that allow manipulation of Microsoft Teams messages

    A report by Check Point shows hackers could forge identities and alter messages.

    By Nov. 4, 2025