Vulnerability


  • Programming code on black screen, green text
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    State-linked groups target critical vulnerability in React Server Components

    China-nexus threat groups have already begun targeting the flaw, creating widespread risk as nearly 40% of cloud environments are potentially impacted.

    By Updated 6 hours ago
  • A man stands and points at a series of monitors on a desk as another man sits in front of the monitors at the desk
    Image attribution tooltip
    Brandon Bell via Getty Images
    Image attribution tooltip

    US, allies urge critical infrastructure operators to carefully plan and oversee AI use

    New guidance attempts to temper companies’ enthusiasm for the latest exciting technology.

    By Dec. 4, 2025
  • security operations center analysts monitoring cyber threats
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Critical vulnerabilities found in React and Next.js

    Researchers warn the flaws can be easily leveraged to achieve full remote code execution.

    By Dec. 4, 2025
  • Fortinet office in Nepean, Canada.
    Image attribution tooltip
    iStock Editorial / Getty Images Plus via Getty Images
    Image attribution tooltip

    Fortinet FortiWeb flaws found in unsupported versions of web application firewall

    Security researchers raise new concerns after the company previously failed to issue prompt security guidance.

    By Dec. 2, 2025
  • The Microsoft pavilion stands at the 2025 Hannover Messe industrial trade fair on March 31, 2025 in Hanover, Germany.
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Microsoft tightens cloud login process to prevent common attack

    Hackers have spent decades exploiting a ubiquitous type of vulnerability. Microsoft is trying to change that.

    By Nov. 26, 2025
  • SolarWinds
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    SEC drops civil fraud case against SolarWinds

    Cybersecurity and legal experts considered the case a potential precedent-setter for risk disclosure.

    By Nov. 20, 2025
  • Fortinet office in Nepean, Canada.
    Image attribution tooltip
    iStock Editorial / Getty Images Plus via Getty Images
    Image attribution tooltip

    Researchers warn command injection flaw in Fortinet FortiWeb is under exploitation

    The medium severity vulnerability can be chained together with a critical flaw in the same product, which could help attackers gain additional capabilities.

    By Nov. 20, 2025
  • An automated automotive assembly line in a factory
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Hackers increasingly target operational technology, with manufacturing sector bearing the brunt

    Companies should segment and monitor their networks to prevent hackers from crossing over from IT to OT, a new report said.

    By Nov. 18, 2025
  • Programming code on black screen, green text
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Critical vulnerability in Fortinet FortiWeb is under exploitation

    The company faces criticism as multiple researchers claim a silent patch was issued weeks before official guidance was released.

    By Nov. 17, 2025
  • Person in subway station
    Image attribution tooltip
    Permission granted by Lenovo
    Image attribution tooltip
    Sponsored by Lenovo and SentinelOne

    AI-driven dynamic endpoint security is redefining trust

    Network perimeters are gone. Modern security solutions must be proactive, dynamic and intelligent.

    By Nima Baiati, Executive Director and General Manager, Commercial Software & Security Solutions, Lenovo • Nov. 17, 2025
  • The FBI seal
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    Akira engaged in ransomware attacks against critical sectors

    The group has stepped up threat activity by abusing edge devices and other tools, reaping hundreds of millions of dollars in illicit gains.

    By Updated Nov. 14, 2025
  • cybersecurity, matrix, abstract
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Sophisticated threat actor targeting zero-day flaws in Cisco ISE and Citrix

    Hackers use custom malware to access multiple vulnerabilities, researchers from Amazon warn.

    By Nov. 12, 2025
  • AI Artificial Intelligence technology for data analysis
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Shadow AI is widespread — and executives use it the most

    Employees in fields like health care and finance trust AI more than they trust their colleagues, according to a new report.

    By Nov. 12, 2025
  • Cisco logo at a conference in Barcelona Spain on Feb. 28, 2022
    Image attribution tooltip
    David Ramos via Getty Images
    Image attribution tooltip

    Cisco detects new attack variant targeting vulnerable firewalls

    Hackers may be able to overload unpatched devices, the company said.

    By Nov. 10, 2025
  • symbol of danger
    Image attribution tooltip
    Permission granted by 10KMedia
    Image attribution tooltip
    Sponsored by 10KMedia

    Your AI-driven threat hunting is only as good as your data platform and pipeline

    The data-centric foundation for modern threat hunting.

    By Taylor Smith, Director of Product Marketing at Exaforce • Nov. 6, 2025
  • A logo sits illuminated outside the Cisco booth at the SK telecom booth on day 1 of the GSMA Mobile World Congress on February 28, 2022 in Barcelona, Spain.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Hackers targeting Cisco IOS XE devices with BadCandy implant

    Security researchers and Australian authorities warn that exploitation activity is ongoing.

    By Updated Nov. 5, 2025
  • Exterior view of Microsoft's Vancouver office in Canada on December 22, 2023.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Researchers warn of flaws that allow manipulation of Microsoft Teams messages

    A report by Check Point shows hackers could forge identities and alter messages.

    By Nov. 4, 2025
  • Microsoft building with logo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Windows Server Update Service exploitation ensnares at least 50 victims

    Researchers say hackers could be gathering intelligence for future attacks, and authorities warn users to apply patches and check for compromise.

    By Oct. 31, 2025
  • Exterior view of Microsoft's Vancouver office in Canada on December 22, 2023.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA, NSA unveil best-practices guide to address ongoing Exchange Server risks

    The guide follows CISA’s warnings in August about a high-severity vulnerability in Microsoft Exchange.

    By Oct. 30, 2025
  • Microsoft AI antitrust concerns
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA updates guidance and warns security teams on WSUS exploitation

    The agency urges users to apply emergency patches from Microsoft to counter a serious threat.

    By Oct. 30, 2025
  • With cyberattacks becoming more frequent, now is the time for CFOs to shore up their cybersecurity programs and strategies.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI adoption outpaces corporate governance, security controls

    Security and business leaders warn that companies are accelerating their use of agentic AI beyond the ability to maintain proper guardrails. 

    By Oct. 29, 2025
  • Microsoft building with logo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Google probes exploitation of critical Windows service CVE

    Researchers have traced the threat activity to a newly identified hacker, while separate evidence points to more than one variant.

    By Oct. 28, 2025
  • Microsoft AI antitrust concerns
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Hackers exploiting critical vulnerability in Windows Server Update Service

    Microsoft has issued an out-of-band update and is urging users to immediately apply the patch.

    By Updated Oct. 27, 2025
  • cybersecurity, matrix, abstract
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Researchers warn of critical flaws in TP-Link routers

    No active exploitation has been spotted, but the vendor and researchers advise users to apply updates immediately. 

    By Oct. 24, 2025
  • Artificial Intelligence digital concept
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI security flaws afflict half of organizations

    EY suggested ways for companies to reduce AI-related hacking risks.

    By Oct. 22, 2025