Vulnerability


  • Exterior of Citrix office complex.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images
    Image attribution tooltip

    Citrix NetScaler products confirmed to be under exploitation

    Security researchers at watchTowr warn that multiple flaws are involved in the early stages of a hacking spree that could rival the 2023 CitrixBleed campaign.

    By Updated March 30, 2026
  • A towering Citrix-branded expo sign; the tagline: "Better experience"
    Image attribution tooltip

    Citrix via Flickr

    Image attribution tooltip

    Critical flaw in Citrix NetScaler raises fears of new exploitation wave

    Researchers warn that security teams need to take immediate mitigation steps before a public proof of concept is released.

    By Updated March 27, 2026
  • Three women sit on a stage and one man stands on the stage with them. Behind them, a blue backdrop displays a logo reading "RSAC 2026 Conference."
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    The CVE Program, a bedrock of global cyber defense, is teetering on the brink

    A funding scare, AI and similar international initiatives are raising existential questions about the program’s future.

    By March 24, 2026
  • Green lights show behind plugged-in cables.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Network edge devices still widely used after reaching end-of-life status

    A report by VulnCheck shows nation-state hackers often target flaws in aging routers, firewalls and VPNs.

    By March 23, 2026
  • Microsoft building with logo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA urges organizations to harden endpoint security following Stryker attack

    The agency is coordinating with the FBI and other agencies amid concerns about additional threat activity involving Microsoft Intune. 

    By March 19, 2026
  • The Cisco office at Santana Row Shopping Mall in San Jose California.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Security teams might be overlooking wider threat to Cisco SD-WAN

    Researchers from VulnCheck warn that a misattributed proof of concept ignores a separate, high-severity flaw. 

    By March 17, 2026
  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Nearly half of exploited zero-day flaws target enterprise-grade technology

    A report by Google Threat Intelligence Group warns that AI will be used to speed and scale attacks in 2026.

    By March 6, 2026
  • Digital security systems for facilities
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Iran-nexus hackers target flaws in surveillance cameras

    The threat activity echoes prior exploitation during the Israeli war with Hamas, a precursor to attacks against critical sectors in the U.S.

    By Updated March 6, 2026
  • Exclamation mark depicted over code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ransomware is now less about malware and more about impersonation

    Stolen passwords have replaced infectious code as the most common tactic in major breaches, Cloudflare said.

    By March 3, 2026
  • Microsoft building with logo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip
    Deep Dive

    How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer

    The technology giant and third-party security vendors are plotting an ambitious overhaul of how their products interoperate.

    By March 2, 2026
  • Man examining a hard drive
    Image attribution tooltip

    ShutterStock/YAKOBCHUK VIACHESLAV

    Image attribution tooltip
    Sponsored by Security Engineered Machinery (SEM)

    Building a risk-based data sanitization strategy: When to use Cryptographic erasure vs. physical destruction

    Build your strategy on risk assessment, not on assumptions that one size fits all.

    By Paul Falcone • March 2, 2026
  • Cyberattack and internet crime, hacking and malware concepts.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    ‘Resurge’ malware can remain undetected on devices

    CISA previously issued an alert about attacks that exploited a vulnerability in Ivanti Connect Secure.

    By Updated Feb. 27, 2026
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA orders agencies to patch Cisco devices now under attack

    The vulnerabilities, scored as critical, affect the company’s software-defined wide-area networking (SD-WAN) systems.

    By Feb. 25, 2026
  • A hand typing login and password
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Software vulnerabilities are being weaponized faster than ever

    A report by VulnCheck shows threat groups are exploiting a small percentage of critical flaws well before security teams can mitigate.

    By Feb. 25, 2026
  • Fingers hover over a computer keyboard with numbers on a screen, against a shadowy backdrop.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Hackers target vulnerabilities in Roundcube Webmail

    CISA has added the flaws, one of which is considered critical, to its Known Exploited Vulnerabilities catalog.

    By Feb. 23, 2026
  • A depiction of computer hardware.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    BeyondTrust Remote Support exploitation ramps up with backdoors, remote tools

    Researchers warn that thousands of instances may still be vulnerable to exploitation activity.

    By Updated Feb. 20, 2026
  • Cyberhackers-Ransomware
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Threat groups use AI to speed up and scale cyberattacks

    A report from Palo Alto Networks finds hackers are increasingly using stolen identities and exploiting critical vulnerabilities within minutes of disclosure.

    By Feb. 18, 2026
  • An image of a digital lock is shown
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Hackers exploit zero-day flaw in Dell RecoverPoint for Virtual Machines

    Threat actors linked to China have deployed a novel backdoor, according to researchers.

    By Updated Feb. 18, 2026
  • a padlock inside a hexagon
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Critical flaw in BeyondTrust Remote Support sees early signs of exploitation

    The vulnerability is a variant of a CVE linked to the 2024 hack of the U.S. Treasury Department, according to researchers.

    By Updated Feb. 16, 2026
  • CFOs play a key role in advocating for preventative cybersecurity actions that help reduce the cost of cyber risks.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    SmarterMail facing widespread attacks targeting critical flaws

    The business email and collaboration software is being exploited for potential ransomware.

    By Feb. 12, 2026
  • Programming code abstract technology background of software developer and Computer script
    Image attribution tooltip

    shutterstock.com/whiteMocca

    Image attribution tooltip
    Sponsored by 10KMedia

    The Future of DAST in an AI-First World: Why Runtime Security Testing Remains Critical

    Runtime validation is where the gap is widening—and where this shift creates the biggest leap forward.

    By Joni Klippert, CEO of StackHawk • Feb. 12, 2026
  • Rendering of digital data code in safety security technology concept.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Majority of Ivanti EPMM threat activity linked to hidden IP

    A report by GreyNoise warns the IP address is operating behind bulletproof hosting infrastructure and might not show up in current IoCs. 

    By Updated Feb. 11, 2026
  • cybersecurity hackers cyberattacks IT
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Extortion attacks on the rise as hackers prioritize supply-chain weaknesses

    Consulting firms and manufacturing companies accounted for many of the ransomware victims posted to the dark web in 2025, Intel 471 said.

    By Feb. 11, 2026
  • A close-up digital illustration portrays cybersecurity with a futuristic theme
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ivanti EPMM exploitation widespread as governments, others targeted

    Researchers warn the activity shows evidence of initial access brokers preparing for future attacks.

    By Feb. 10, 2026
  • Brainstorming IT Programmers Use Computer Together, Talk Strategy, Discuss Planning.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Threat actors target SolarWinds Web Help Desk flaw

    Researchers say hackers are using remote monitoring and other tools in compromised environments.

    By Feb. 9, 2026