Vulnerability


  • Person in subway station
    Image attribution tooltip
    Permission granted by Lenovo
    Image attribution tooltip
    Sponsored by Lenovo and SentinelOne

    AI-driven dynamic endpoint security is redefining trust

    Network perimeters are gone. Modern security solutions must be proactive, dynamic and intelligent.

    By Nima Baiati, Executive Director and General Manager, Commercial Software & Security Solutions, Lenovo • Nov. 17, 2025
  • The FBI seal
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    Akira actively engaged in ransomware attacks against critical sectors

    The group has stepped up threat activity by abusing edge devices and other tools, reaping hundreds of millions of dollars in illicit gains.

    By Updated Nov. 14, 2025
  • cybersecurity, matrix, abstract
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Sophisticated threat actor targeting zero-day flaws in Cisco ISE and Citrix

    Hackers use custom malware to access multiple vulnerabilities, researchers from Amazon warn.

    By Nov. 12, 2025
  • AI Artificial Intelligence technology for data analysis
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Shadow AI is widespread — and executives use it the most

    Employees in fields like health care and finance trust AI more than they trust their colleagues, according to a new report.

    By Nov. 12, 2025
  • Cisco logo at a conference in Barcelona Spain on Feb. 28, 2022
    Image attribution tooltip
    David Ramos via Getty Images
    Image attribution tooltip

    Cisco detects new attack variant targeting vulnerable firewalls

    Hackers may be able to overload unpatched devices, the company said.

    By Nov. 10, 2025
  • symbol of danger
    Image attribution tooltip
    Permission granted by 10KMedia
    Image attribution tooltip
    Sponsored by 10KMedia

    Your AI-driven threat hunting is only as good as your data platform and pipeline

    The data-centric foundation for modern threat hunting.

    By Taylor Smith, Director of Product Marketing at Exaforce • Nov. 6, 2025
  • A logo sits illuminated outside the Cisco booth at the SK telecom booth on day 1 of the GSMA Mobile World Congress on February 28, 2022 in Barcelona, Spain.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Hackers targeting Cisco IOS XE devices with BadCandy implant

    Security researchers and Australian authorities warn that exploitation activity is ongoing.

    By Updated Nov. 5, 2025
  • Exterior view of Microsoft's Vancouver office in Canada on December 22, 2023.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Researchers warn of flaws that allow manipulation of Microsoft Teams messages

    A report by Check Point shows hackers could forge identities and alter messages.

    By Nov. 4, 2025
  • Microsoft building with logo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Windows Server Update Service exploitation ensnares at least 50 victims

    Researchers say hackers could be gathering intelligence for future attacks, and authorities warn users to apply patches and check for compromise.

    By Oct. 31, 2025
  • Exterior view of Microsoft's Vancouver office in Canada on December 22, 2023.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA, NSA unveil best-practices guide to address ongoing Exchange Server risks

    The guide follows CISA’s warnings in August about a high-severity vulnerability in Microsoft Exchange.

    By Oct. 30, 2025
  • Microsoft AI antitrust concerns
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA updates guidance and warns security teams on WSUS exploitation

    The agency urges users to apply emergency patches from Microsoft to counter a serious threat.

    By Oct. 30, 2025
  • With cyberattacks becoming more frequent, now is the time for CFOs to shore up their cybersecurity programs and strategies.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI adoption outpaces corporate governance, security controls

    Security and business leaders warn that companies are accelerating their use of agentic AI beyond the ability to maintain proper guardrails. 

    By Oct. 29, 2025
  • Microsoft building with logo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Google probes exploitation of critical Windows service CVE

    Researchers have traced the threat activity to a newly identified hacker, while separate evidence points to more than one variant.

    By Oct. 28, 2025
  • Microsoft AI antitrust concerns
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Hackers exploiting critical vulnerability in Windows Server Update Service

    Microsoft has issued an out-of-band update and is urging users to immediately apply the patch.

    By Updated Oct. 27, 2025
  • cybersecurity, matrix, abstract
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Researchers warn of critical flaws in TP-Link routers

    No active exploitation has been spotted, but the vendor and researchers advise users to apply updates immediately. 

    By Oct. 24, 2025
  • Artificial Intelligence digital concept
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI security flaws afflict half of organizations

    EY suggested ways for companies to reduce AI-related hacking risks.

    By Oct. 22, 2025
  • Exclamation mark depicted over code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    F5 supply chain hack endangers more than 600,000 internet-connected devices

    The enterprise device vendor has patched several vulnerabilities that hackers discovered after breaching its networks.

    By Oct. 17, 2025
  • The words "F5 Tower" are displayed on the outside of a metal-and-wood building with many windows.
    Image attribution tooltip
    Courtesy of F5 Press Kit
    Image attribution tooltip

    Nation-state hackers breached sensitive F5 systems, stole customer data

    The federal government is scrambling to determine if any agencies have been hacked.

    By Oct. 15, 2025
  • An image of a digital lock is shown
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Oracle E-Business Suite exploitation traced back as early as July

    Researchers say an extortion campaign linked to the Clop ransomware group used a series of chained vulnerabilities and sophisticated malware.

    By Oct. 10, 2025
  • Oracle corporation sign hanging on the top of the building in Brisbane.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Extortion campaign targeting Oracle E-Business Suite customers linked to zero-day

    Mandiant researchers said Clop ransomware is indeed linked to a series of emails threatening to release stolen data. 

    By Oct. 6, 2025
  • The red lock and its structure explode in a digital computer setting.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cisco firewall flaws endanger nearly 50,000 devices worldwide

    The U.S., the U.K. and Japan lead the list of the most vulnerable countries.

    By Sept. 30, 2025
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA orders feds to patch Cisco flaws used in multiple agency hacks

    One U.S. official called the ongoing cyberattack campaign “very sophisticated.”

    By Sept. 25, 2025
  • Fuel holding tanks are seen in an overhead view
    Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Critical infrastructure operators add more insecure industrial equipment online

    The problem isn’t limited to legacy technology. New devices are exposed with critical vulnerabilities.

    By Sept. 25, 2025
  • Illustrated man with fishing hook stealing key
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Social engineering campaigns highlight the ability to exploit human behavior

    A report by S&P says organizations should consider changes to strengthen cyber governance, training and awareness. 

    By Sept. 22, 2025
  • The letters AI on a digital block
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI-powered vulnerability detection will make things worse, not better, former US cyber official warns

    Patching won’t be able to keep up with discovery, said Rob Joyce, who once led the National Security Agency's elite hacking team.

    By Sept. 22, 2025