Vulnerability


  • Six men stand on a stage. Three men hold an oversized $4 million check made out to "Team Atlanta," while two of the other men flank this trio and pose for a photo with them. The sixth person stands off to the side and applauds.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip
    Deep Dive

    How a government contest launched a revolution in AI-based bug hunting

    Security researchers have spent months honing AI systems that can find and fix serious vulnerabilities. Critical infrastructure everywhere could benefit.

    By May 18, 2026
  • The Cisco office at Santana Row Shopping Mall in San Jose California.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Attackers exploit critical flaw in Cisco Catalyst SD-WAN Controller

    Researchers discovered the authentication bypass vulnerability while investigating a prior issue in the same service.

    By May 15, 2026
  • Digital background depicting AI systems and machine learning technologies
    Image attribution tooltip
    MF3d via Getty Images
    Image attribution tooltip

    Frontier AI models reap rapid discovery of security vulnerabilities

    Security teams have just a few months before AI-driven exploitation becomes the norm, researchers warn.

    By May 14, 2026
  • Sam Altman speaks in a conference setting
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    OpenAI launches Daybreak to combat cyber threats

    The cybersecurity initiative uses AI to detect software vulnerabilities, partnering with Cloudflare, Cisco and CrowdStrike to counter threats.

    By Paige Gross • May 13, 2026
  • Artificial intelligence technology AI symbol digital concept 3d illustration
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Identity takes center stage as a leading factor in enterprise cyberattacks

    A new report shows two-thirds of ransomware attacks began with an identity-related breach.

    By May 12, 2026
  • Digital background depicting AI systems and machine learning technologies
    Image attribution tooltip
    MF3d via Getty Images
    Image attribution tooltip

    AI used to develop working zero-day exploit, researchers warn

    A report by GTIG shows threat groups are increasingly leveraging AI to scale attacks. The exploitation attempt was disclosed and patched, preventing a mass incident.

    By May 11, 2026
  • Palo Alto Networks
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Palo Alto Networks warns state-linked cluster behind zero-day exploitation

    A patch for the flaw, which hackers began targeting in early April, won’t be ready for another week.

    By May 7, 2026
  • a worker looking at a screen
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Critical vulnerability in cPanel leads to widespread exploitation

    Researchers warn that threat activity continues to surge, including brute force attacks and ransomware.

    By May 4, 2026
  • A series of yellow folders that depict lines of binary code running between them.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    New MOVEit vulnerabilities prompt urgent patch warning

    Progress Software warned customers to immediately upgrade the file-transfer tool to fix the serious flaws.

    By May 4, 2026
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA adds Microsoft, ConnectWise vulnerabilities to active exploitation catalog

    Russia has used one of the flaws, security experts said, while North Korea has used the other.

    By April 29, 2026
  • Nick Andersen, executive assistant director for cybersecurity, speaks during the Billington Cybersecurity Summit in Washington D.C. on Sept. 11, 2025.
    Image attribution tooltip
    Courtesy of Billington
    Image attribution tooltip

    US, UK authorities warn that Firestarter backdoor malware survives patching

    A federal agency was impacted by a hacking campaign that exploited flaws in Cisco devices.

    By April 27, 2026
  • Image of a green computer screen with COBOL coding on it.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI-written software creates hassles for wary security teams

    A new report explains what cybersecurity practitioners need to see before they trust AI coding tools. 

    By April 23, 2026
  • Exterior view of Microsoft's Vancouver office in Canada on December 22, 2023.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Microsoft SharePoint vulnerability widely exposed across multiple countries

    The disclosure comes just weeks after a prior SharePoint flaw was discovered.

    By April 22, 2026
  • Cisco logo at a conference in Barcelona Spain on Feb. 28, 2022
    Image attribution tooltip
    David Ramos via Getty Images
    Image attribution tooltip

    CISA confirms exploitation of 3 more Cisco networking device vulnerabilities

    Cisco revealed six critical flaws in widely used products in February. The government has now seen evidence that hackers are abusing four of them.

    By April 21, 2026
  • A hand holds a magnifying glass up to a red exclamation point enclosed by a red triangle
    Image attribution tooltip
    tadamichi via Getty Images
    Image attribution tooltip

    Vulnerability exploitation surges often precede disclosure, offering possible early warnings

    Organizations can get ahead of major flaws with the right threat intelligence, according to a new report.

    By April 20, 2026
  • A woman wearing a surgical mask stands in front of a booth for the Chinese networking company TP-Link at a German consumer electronics trade show.
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    TP-Link routers face exploitation attempt linked to high-severity flaw

    Researchers warn a potential botnet is targeting a vulnerability in end-of-life devices. 

    By April 17, 2026
  • a digital padlock illustration with the letters AI
    Image attribution tooltip
    BlackJack3D via Getty Images
    Image attribution tooltip

    CIOs fret over rising security concerns amid AI adoption

    AI is emerging as a critical tool and a growing threat as CIOs struggle to balance innovation with risk, according to a new report.

    By Scarlett Evans • April 16, 2026
  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    R. Eskalis/NIST. Retrieved from NIST.
    Image attribution tooltip

    NIST limits vulnerability analysis as CVE backlog swells

    The agency will stop adding detailed information to vulnerabilities that don’t meet certain criteria.

    By April 16, 2026
  • The word "Netgear" is spelled out in large purple letters attached to a metal bar hanging from a ceiling
    Image attribution tooltip
    Ethan Miller via Getty Images
    Image attribution tooltip

    FCC exempts Netgear from foreign router ban

    The commission did not explain its action beyond citing a Defense Department determination.

    By April 15, 2026
  • The Microsoft logo is pictures on the technology company's headquarters in Redmond, Washington, on July 3, 2024.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Medium-severity flaw in Microsoft SharePoint exploited

    The flaw should be taken seriously, despite its relatively low score, according to researchers.

    By Updated April 16, 2026
  • A close-up digital illustration portrays cybersecurity with a futuristic theme
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA adds second critical flaw in Ivanti EPMM to exploited vulnerabilities catalog

    The code injection flaw is similar to a prior vulnerability that was immediately flagged in January.

    By April 9, 2026
  • Hand grabbing password out of blurred code.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    React2Shell vulnerability helps hackers steal credentials, AI platform keys and other sensitive data

    The stolen information could help intruders plan follow-up attacks and breach more organizations, Cisco researchers said.

    By April 7, 2026
  • A building with large glass windows bears the Fortinet logo at the top, while a sign at ground level reads "Fortinet - 909 Kifer Road"
    Image attribution tooltip
    Courtesy of Fortinet
    Image attribution tooltip

    Critical flaw in FortiClient EMS under exploitation

    Fortinet released an emergency hotfix after security researchers discovered the vulnerability being exploited as a zero-day.

    By Updated April 6, 2026
  • A series of yellow folders that depict lines of binary code running between them.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Researchers warn of critical flaws in Progress ShareFile

    Attackers could chain vulnerabilities together, leading to configuration changes or remote code execution.

    By April 3, 2026
  • The words "F5 Tower" are displayed on the outside of a metal-and-wood building with many windows.
    Image attribution tooltip
    Courtesy of F5 Press Kit
    Image attribution tooltip

    Critical flaw in F5 BIG-IP faces wide exploitation risk

    The company revised a security advisory as newly disclosed information heightens the potential impact.

    By April 2, 2026