Vulnerability


  • The Microsoft pavilion stands at the 2025 Hannover Messe industrial trade fair on March 31, 2025 in Hanover, Germany.
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Microsoft tightens cloud login process to prevent common attack

    Hackers have spent decades exploiting a ubiquitous type of vulnerability. Microsoft is trying to change that.

    By Nov. 26, 2025
  • SolarWinds
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    SEC drops civil fraud case against SolarWinds

    Cybersecurity and legal experts considered the case a potential precedent-setter for risk disclosure.

    By Nov. 20, 2025
  • Fortinet office in Nepean, Canada.
    Image attribution tooltip
    iStock Editorial / Getty Images Plus via Getty Images
    Image attribution tooltip

    Researchers warn command injection flaw in Fortinet FortiWeb is under exploitation

    The medium severity vulnerability can be chained together with a critical flaw in the same product, which could help attackers gain additional capabilities.

    By Nov. 20, 2025
  • An automated automotive assembly line in a factory
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Hackers increasingly target operational technology, with manufacturing sector bearing the brunt

    Companies should segment and monitor their networks to prevent hackers from crossing over from IT to OT, a new report said.

    By Nov. 18, 2025
  • Programming code on black screen, green text
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Critical vulnerability in Fortinet FortiWeb is under exploitation

    The company faces criticism as multiple researchers claim a silent patch was issued weeks before official guidance was released.

    By Nov. 17, 2025
  • Person in subway station
    Image attribution tooltip
    Permission granted by Lenovo
    Image attribution tooltip
    Sponsored by Lenovo and SentinelOne

    AI-driven dynamic endpoint security is redefining trust

    Network perimeters are gone. Modern security solutions must be proactive, dynamic and intelligent.

    By Nima Baiati, Executive Director and General Manager, Commercial Software & Security Solutions, Lenovo • Nov. 17, 2025
  • The FBI seal
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    Akira engaged in ransomware attacks against critical sectors

    The group has stepped up threat activity by abusing edge devices and other tools, reaping hundreds of millions of dollars in illicit gains.

    By Updated Nov. 14, 2025
  • cybersecurity, matrix, abstract
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Sophisticated threat actor targeting zero-day flaws in Cisco ISE and Citrix

    Hackers use custom malware to access multiple vulnerabilities, researchers from Amazon warn.

    By Nov. 12, 2025
  • AI Artificial Intelligence technology for data analysis
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Shadow AI is widespread — and executives use it the most

    Employees in fields like health care and finance trust AI more than they trust their colleagues, according to a new report.

    By Nov. 12, 2025
  • Cisco logo at a conference in Barcelona Spain on Feb. 28, 2022
    Image attribution tooltip
    David Ramos via Getty Images
    Image attribution tooltip

    Cisco detects new attack variant targeting vulnerable firewalls

    Hackers may be able to overload unpatched devices, the company said.

    By Nov. 10, 2025
  • symbol of danger
    Image attribution tooltip
    Permission granted by 10KMedia
    Image attribution tooltip
    Sponsored by 10KMedia

    Your AI-driven threat hunting is only as good as your data platform and pipeline

    The data-centric foundation for modern threat hunting.

    By Taylor Smith, Director of Product Marketing at Exaforce • Nov. 6, 2025
  • A logo sits illuminated outside the Cisco booth at the SK telecom booth on day 1 of the GSMA Mobile World Congress on February 28, 2022 in Barcelona, Spain.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Hackers targeting Cisco IOS XE devices with BadCandy implant

    Security researchers and Australian authorities warn that exploitation activity is ongoing.

    By Updated Nov. 5, 2025
  • Exterior view of Microsoft's Vancouver office in Canada on December 22, 2023.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Researchers warn of flaws that allow manipulation of Microsoft Teams messages

    A report by Check Point shows hackers could forge identities and alter messages.

    By Nov. 4, 2025
  • Microsoft building with logo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Windows Server Update Service exploitation ensnares at least 50 victims

    Researchers say hackers could be gathering intelligence for future attacks, and authorities warn users to apply patches and check for compromise.

    By Oct. 31, 2025
  • Exterior view of Microsoft's Vancouver office in Canada on December 22, 2023.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA, NSA unveil best-practices guide to address ongoing Exchange Server risks

    The guide follows CISA’s warnings in August about a high-severity vulnerability in Microsoft Exchange.

    By Oct. 30, 2025
  • Microsoft AI antitrust concerns
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA updates guidance and warns security teams on WSUS exploitation

    The agency urges users to apply emergency patches from Microsoft to counter a serious threat.

    By Oct. 30, 2025
  • With cyberattacks becoming more frequent, now is the time for CFOs to shore up their cybersecurity programs and strategies.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI adoption outpaces corporate governance, security controls

    Security and business leaders warn that companies are accelerating their use of agentic AI beyond the ability to maintain proper guardrails. 

    By Oct. 29, 2025
  • Microsoft building with logo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Google probes exploitation of critical Windows service CVE

    Researchers have traced the threat activity to a newly identified hacker, while separate evidence points to more than one variant.

    By Oct. 28, 2025
  • Microsoft AI antitrust concerns
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Hackers exploiting critical vulnerability in Windows Server Update Service

    Microsoft has issued an out-of-band update and is urging users to immediately apply the patch.

    By Updated Oct. 27, 2025
  • cybersecurity, matrix, abstract
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Researchers warn of critical flaws in TP-Link routers

    No active exploitation has been spotted, but the vendor and researchers advise users to apply updates immediately. 

    By Oct. 24, 2025
  • Artificial Intelligence digital concept
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI security flaws afflict half of organizations

    EY suggested ways for companies to reduce AI-related hacking risks.

    By Oct. 22, 2025
  • Exclamation mark depicted over code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    F5 supply chain hack endangers more than 600,000 internet-connected devices

    The enterprise device vendor has patched several vulnerabilities that hackers discovered after breaching its networks.

    By Oct. 17, 2025
  • The words "F5 Tower" are displayed on the outside of a metal-and-wood building with many windows.
    Image attribution tooltip
    Courtesy of F5 Press Kit
    Image attribution tooltip

    Nation-state hackers breached sensitive F5 systems, stole customer data

    The federal government is scrambling to determine if any agencies have been hacked.

    By Oct. 15, 2025
  • An image of a digital lock is shown
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Oracle E-Business Suite exploitation traced back as early as July

    Researchers say an extortion campaign linked to the Clop ransomware group used a series of chained vulnerabilities and sophisticated malware.

    By Oct. 10, 2025
  • Oracle corporation sign hanging on the top of the building in Brisbane.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Extortion campaign targeting Oracle E-Business Suite customers linked to zero-day

    Mandiant researchers said Clop ransomware is indeed linked to a series of emails threatening to release stolen data. 

    By Oct. 6, 2025