Vulnerability


  • Cisco logo at a conference in Barcelona Spain on Feb. 28, 2022
    Image attribution tooltip
    David Ramos via Getty Images
    Image attribution tooltip

    CISA confirms exploitation of 3 more Cisco networking device vulnerabilities

    Cisco revealed six critical flaws in widely used products in February. The government has now seen evidence that hackers are abusing four of them.

    By April 21, 2026
  • A hand holds a magnifying glass up to a red exclamation point enclosed by a red triangle
    Image attribution tooltip
    tadamichi via Getty Images
    Image attribution tooltip

    Vulnerability exploitation surges often precede disclosure, offering possible early warnings

    Organizations can get ahead of major flaws with the right threat intelligence, according to a new report.

    By April 20, 2026
  • A woman wearing a surgical mask stands in front of a booth for the Chinese networking company TP-Link at a German consumer electronics trade show.
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    TP-Link routers face exploitation attempt linked to high-severity flaw

    Researchers warn a potential botnet is targeting a vulnerability in end-of-life devices. 

    By April 17, 2026
  • a digital padlock illustration with the letters AI
    Image attribution tooltip
    BlackJack3D via Getty Images
    Image attribution tooltip

    CIOs fret over rising security concerns amid AI adoption

    AI is emerging as a critical tool and a growing threat as CIOs struggle to balance innovation with risk, according to a new report.

    By Scarlett Evans • April 16, 2026
  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    R. Eskalis/NIST. Retrieved from NIST.
    Image attribution tooltip

    NIST limits vulnerability analysis as CVE backlog swells

    The agency will stop adding detailed information to vulnerabilities that don’t meet certain criteria.

    By April 16, 2026
  • The word "Netgear" is spelled out in large purple letters attached to a metal bar hanging from a ceiling
    Image attribution tooltip
    Ethan Miller via Getty Images
    Image attribution tooltip

    FCC exempts Netgear from foreign router ban

    The commission did not explain its action beyond citing a Defense Department determination.

    By April 15, 2026
  • The Microsoft logo is pictures on the technology company's headquarters in Redmond, Washington, on July 3, 2024.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Medium-severity flaw in Microsoft SharePoint exploited

    The flaw should be taken seriously, despite its relatively low score, according to researchers.

    By Updated April 16, 2026
  • A close-up digital illustration portrays cybersecurity with a futuristic theme
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA adds second critical flaw in Ivanti EPMM to exploited vulnerabilities catalog

    The code injection flaw is similar to a prior vulnerability that was immediately flagged in January.

    By April 9, 2026
  • Hand grabbing password out of blurred code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    React2Shell vulnerability helps hackers steal credentials, AI platform keys and other sensitive data

    The stolen information could help intruders plan follow-up attacks and breach more organizations, Cisco researchers said.

    By April 7, 2026
  • A building with large glass windows bears the Fortinet logo at the top, while a sign at ground level reads "Fortinet - 909 Kifer Road"
    Image attribution tooltip
    Courtesy of Fortinet
    Image attribution tooltip

    Critical flaw in FortiClient EMS under exploitation

    Fortinet released an emergency hotfix after security researchers discovered the vulnerability being exploited as a zero-day.

    By Updated April 6, 2026
  • A series of yellow folders that depict lines of binary code running between them.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Researchers warn of critical flaws in Progress ShareFile

    Attackers could chain vulnerabilities together, leading to configuration changes or remote code execution.

    By April 3, 2026
  • The words "F5 Tower" are displayed on the outside of a metal-and-wood building with many windows.
    Image attribution tooltip
    Courtesy of F5 Press Kit
    Image attribution tooltip

    Critical flaw in F5 BIG-IP faces wide exploitation risk

    The company revised a security advisory as newly disclosed information heightens the potential impact.

    By April 2, 2026
  • Exterior of Citrix office complex.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images
    Image attribution tooltip

    Citrix NetScaler products confirmed to be under exploitation

    Security researchers at watchTowr warn that multiple flaws are involved in the early stages of a hacking spree that could rival the 2023 CitrixBleed campaign.

    By Updated March 30, 2026
  • A towering Citrix-branded expo sign; the tagline: "Better experience"
    Image attribution tooltip

    Citrix via Flickr

    Image attribution tooltip

    Critical flaw in Citrix NetScaler raises fears of new exploitation wave

    Researchers warn that security teams need to take immediate mitigation steps before a public proof of concept is released.

    By Updated March 27, 2026
  • Three women sit on a stage and one man stands on the stage with them. Behind them, a blue backdrop displays a logo reading "RSAC 2026 Conference."
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    The CVE Program, a bedrock of global cyber defense, is teetering on the brink

    A funding scare, AI and similar international initiatives are raising existential questions about the program’s future.

    By March 24, 2026
  • Green lights show behind plugged-in cables.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Network edge devices still widely used after reaching end-of-life status

    A report by VulnCheck shows nation-state hackers often target flaws in aging routers, firewalls and VPNs.

    By March 23, 2026
  • Microsoft building with logo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA urges organizations to harden endpoint security following Stryker attack

    The agency is coordinating with the FBI and other agencies amid concerns about additional threat activity involving Microsoft Intune. 

    By March 19, 2026
  • The Cisco office at Santana Row Shopping Mall in San Jose California.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Security teams might be overlooking wider threat to Cisco SD-WAN

    Researchers from VulnCheck warn that a misattributed proof of concept ignores a separate, high-severity flaw. 

    By March 17, 2026
  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Nearly half of exploited zero-day flaws target enterprise-grade technology

    A report by Google Threat Intelligence Group warns that AI will be used to speed and scale attacks in 2026.

    By March 6, 2026
  • Digital security systems for facilities
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Iran-nexus hackers target flaws in surveillance cameras

    The threat activity echoes prior exploitation during the Israeli war with Hamas, a precursor to attacks against critical sectors in the U.S.

    By Updated March 6, 2026
  • Exclamation mark depicted over code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ransomware is now less about malware and more about impersonation

    Stolen passwords have replaced infectious code as the most common tactic in major breaches, Cloudflare said.

    By March 3, 2026
  • Microsoft building with logo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer

    The technology giant and third-party security vendors are plotting an ambitious overhaul of how their products interoperate.

    By March 2, 2026
  • Man examining a hard drive
    Image attribution tooltip

    ShutterStock/YAKOBCHUK VIACHESLAV

    Image attribution tooltip
    Sponsored by Security Engineered Machinery (SEM)

    Building a risk-based data sanitization strategy: When to use Cryptographic erasure vs. physical destruction

    Build your strategy on risk assessment, not on assumptions that one size fits all.

    By Paul Falcone • March 2, 2026
  • Cyberattack and internet crime, hacking and malware concepts.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    ‘Resurge’ malware can remain undetected on devices

    CISA previously issued an alert about attacks that exploited a vulnerability in Ivanti Connect Secure.

    By Updated Feb. 27, 2026
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA orders agencies to patch Cisco devices now under attack

    The vulnerabilities, scored as critical, affect the company’s software-defined wide-area networking (SD-WAN) systems.

    By Feb. 25, 2026