Vulnerability


  • Hooded hacker sits in front of computer screens.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA, security researchers warn FortiCloud SSO flaw is under attack

    The exploitation activity comes weeks after a similar authentication bypass vulnerability was found.

    By Jan. 29, 2026
  • An artist's rendering of 3D shapes with AI, signifying a creative display of technology.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Corporate workers lean on shadow AI to enhance speed

    A report shows senior corporate executives are willing to allow unsanctioned AI use, which could place company data at risk.

    By Updated Jan. 28, 2026
  • Seven different icons for different artificial intelligence apps display side by side on a phone screen.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI tools break quickly, underscoring need for governance

    In a new report, the security firm Zscaler said it identified severe vulnerabilities in every enterprise tool it tested — sometimes on its first prompt.

    By Jan. 28, 2026
  • Nurses wearing surgical masks look at a computer in a hospital
    Image attribution tooltip
    Win McNamee via Getty Images
    Image attribution tooltip

    Interconnectedness, extortion risk make cybersecurity a healthcare C-suite priority

    A new report from Trellix reviews the biggest breaches, describes the most effective defenses and profiles the most dangerous attackers.

    By Jan. 27, 2026
  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    R. Eskalis/NIST. Retrieved from NIST.
    Image attribution tooltip

    NIST is rethinking its role in analyzing software vulnerabilities

    As the agency’s vulnerability database buckles under a flood of submissions, it’s planning to shift some responsibilities to other parties.

    By Jan. 23, 2026
  • Cyberattack and internet crime, hacking and malware concepts.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Critical flaw in Fortinet FortiSIEM targeted in exploitation threat

    Researchers originally disclosed the vulnerability in August 2025, however, a proof of concept and an advisory were just released.

    By Jan. 16, 2026
  • Dozens of lines of computer code on a monitor.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Critical flaw in AWS Console risked compromise of build environment

    The CodeBreach vulnerability could have enabled a massive supply chain attack, researchers warn.

    By Updated Jan. 15, 2026
  • Glowing AI chip with digital circuits and rising candlestick charts
    Image attribution tooltip
    peshkov via Getty Images
    Image attribution tooltip

    Critical vulnerability found in n8n workflow automation platform

    The open-source platform is widely used across enterprise environments, leaving thousands of instances at risk.

    By Jan. 12, 2026
  • A cell tower is seen in a close-up shot
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Telecom sector sees steady rise in ransomware attacks

    A new threat intelligence report described a potent mix of unpatched flaws and lax perimeter controls.

    By Jan. 9, 2026
  • Seven different icons for different artificial intelligence apps display side by side on a phone screen.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Risky shadow AI use remains widespread

    A new report offers fresh evidence for why enterprises should prioritize AI governance policies.

    By Jan. 6, 2026
  • cybersecurity, matrix, abstract
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Thousands of firewalls at risk as legacy flaw in Fortinet faces renewed threat

    The company in December warned of recent attacks targeting a 2020 vulnerability.

    By Updated Jan. 5, 2026
  • A close-up digital illustration portrays cybersecurity with a futuristic theme
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    WatchGuard warns critical flaw in Firebox devices facing exploitation

    The company said the threat activity is part of a larger campaign against edge devices and internet-exposed infrastructure.

    By Updated Dec. 23, 2025
  • A logo sits illuminated outside the Cisco booth at the SK telecom booth on day 1 of the GSMA Mobile World Congress on February 28, 2022 in Barcelona, Spain.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    China-linked hackers exploit insecure setting in Cisco security products

    The company urged customers to immediately reconfigure affected products.

    By Dec. 18, 2025
  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    R. Eskalis/NIST. Retrieved from NIST.
    Image attribution tooltip

    NIST adds to AI security guidance with Cybersecurity Framework profile

    Organizations have a new resource to map AI considerations onto NIST’s most famous security blueprint.

    By Dec. 17, 2025
  • Fortinet office in Nepean, Canada.
    Image attribution tooltip
    iStock Editorial / Getty Images Plus via Getty Images
    Image attribution tooltip

    FortiGate devices targeted with malicious SSO logins

    Researchers discovered threat activity less than a week after Fortinet disclosed critical vulnerabilities in multiple products.

    By Dec. 17, 2025
  • Cyber security is compromised
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    React2Shell attacks expand widely across multiple sectors

    Researchers warn that state-linked and opportunistic actors are working to exploit flaws in React’s application tools.

    By Dec. 16, 2025
  • Programming code on black screen, green text
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    React issues new patches after security researchers flag additional flaws

    Researchers warn that critical infrastructure providers and government sites are being targeted by state-linked attackers.

    By Dec. 12, 2025
  • A close-up digital illustration portrays cybersecurity with a futuristic theme
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    React Server Components crisis escalates as security teams respond to compromises

    Suspected North Korean actors target users with fake IT recruitment scheme.

    By Dec. 10, 2025
  • Pools of water are seen in an aerial photo of a wastewater treatment plant
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Pro-Russia hacktivists launching attacks that could damage OT

    The U.S. and its allies warned that defenders should take the hackers seriously, despite the attackers’ pattern of exaggerating their actual impact.

    By Dec. 10, 2025
  • Programming code on black screen, green text
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    State-linked groups target critical vulnerability in React Server Components

    China-nexus threat groups have already begun targeting the flaw, creating widespread risk as nearly 40% of cloud environments are potentially impacted.

    By Updated Dec. 7, 2025
  • A man stands and points at a series of monitors on a desk as another man sits in front of the monitors at the desk
    Image attribution tooltip
    Brandon Bell via Getty Images
    Image attribution tooltip

    US, allies urge critical infrastructure operators to carefully plan and oversee AI use

    New guidance attempts to temper companies’ enthusiasm for the latest exciting technology.

    By Dec. 4, 2025
  • security operations center analysts monitoring cyber threats
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Critical vulnerabilities found in React and Next.js

    Researchers warn the flaws can be easily leveraged to achieve full remote code execution.

    By Dec. 4, 2025
  • Fortinet office in Nepean, Canada.
    Image attribution tooltip
    iStock Editorial / Getty Images Plus via Getty Images
    Image attribution tooltip

    Fortinet FortiWeb flaws found in unsupported versions of web application firewall

    Security researchers raise new concerns after the company previously failed to issue prompt security guidance.

    By Dec. 2, 2025
  • The Microsoft pavilion stands at the 2025 Hannover Messe industrial trade fair on March 31, 2025 in Hanover, Germany.
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Microsoft tightens cloud login process to prevent common attack

    Hackers have spent decades exploiting a ubiquitous type of vulnerability. Microsoft is trying to change that.

    By Nov. 26, 2025
  • SolarWinds
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    SEC drops civil fraud case against SolarWinds

    Cybersecurity and legal experts considered the case a potential precedent-setter for risk disclosure.

    By Nov. 20, 2025