News

Microsoft patched vulnerabilities for the Common Log File System driver, Microsoft Edge, SharePoint, and more.
By prioritizing vulnerability management, companies can stay ahead of threats and ensure compliance through proactive ...
What practical steps should security leaders take to bolster their defenses against the next wave of ransomware attacks?
"Old vs. new tech," reliance on technology, geopolitical instability increase cyber threat, according to Allianz.
Two ransomware groups and several Chinese APTs have been exploiting two recent SAP NetWeaver vulnerabilities. At least two ransomware groups and multiple Chinese APTs have been observed targeting two ...
The age of central authority is being reshaped—and in its place, a more decentralized, democratic internet is arising.
CISA warned U.S. federal agencies to secure their systems against ongoing attacks exploiting a high-severity vulnerability in ...
In some environments, this could even give attackers the ability to bypass multi-factor authentication (MFA). The ...
By its reckoning, the total number of vulnerabilities discovered in 2024 rose by 61% annually to 6761, with Linux bugs ...
Too many businesses are treating cybersecurity as an optional extra rather than a necessary investment, says a Bayes Business ...
On the first day of Pwn2Own Berlin 2025, security researchers were awarded $260,000 after successfully demonstrating zero-day ...
According to a security advisory from Google, the search giant is aware that an exploit for this flaw exists in the wild.