Vulnerability


  • a padlock inside a hexagon
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Critical flaw in BeyondTrust Remote Support sees early signs of exploitation

    The vulnerability is a variant of a CVE linked to the 2024 hack of the U.S. Treasury Department, according to researchers.

    By Feb. 13, 2026
  • CFOs play a key role in advocating for preventative cybersecurity actions that help reduce the cost of cyber risks.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    SmarterMail facing widespread attacks targeting critical flaws

    The business email and collaboration software is being exploited for potential ransomware.

    By Feb. 12, 2026
  • Programming code abstract technology background of software developer and Computer script
    Image attribution tooltip

    shutterstock.com/whiteMocca

    Image attribution tooltip
    Sponsored by 10KMedia

    The Future of DAST in an AI-First World: Why Runtime Security Testing Remains Critical

    Runtime validation is where the gap is widening—and where this shift creates the biggest leap forward.

    By Joni Klippert, CEO of StackHawk • Feb. 12, 2026
  • Rendering of digital data code in safety security technology concept.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Majority of Ivanti EPMM threat activity linked to hidden IP

    A report by GreyNoise warns the IP address is operating behind bulletproof hosting infrastructure and might not show up in current IoCs. 

    By Updated Feb. 11, 2026
  • cybersecurity hackers cyberattacks IT
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Extortion attacks on the rise as hackers prioritize supply-chain weaknesses

    Consulting firms and manufacturing companies accounted for many of the ransomware victims posted to the dark web in 2025, Intel 471 said.

    By Feb. 11, 2026
  • A close-up digital illustration portrays cybersecurity with a futuristic theme
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ivanti EPMM exploitation widespread as governments, others targeted

    Researchers warn the activity shows evidence of initial access brokers preparing for future attacks.

    By Feb. 10, 2026
  • Brainstorming IT Programmers Use Computer Together, Talk Strategy, Discuss Planning.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Threat actors target SolarWinds Web Help Desk flaw

    Researchers say hackers are using remote monitoring and other tools in compromised environments.

    By Feb. 9, 2026
  • Picture of a cybersecurity lock
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Critical flaw in SolarWinds Web Help Desk under exploitation

    The vulnerability could allow an attacker to achieve remote code execution. 

    By Updated Feb. 5, 2026
  • Popular AI virtual assistant apps on a smartphone, including ChatGPT, DeepSeek, Anthropic Claude, Perplexity, Google Gemini and Microsoft Copilot.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Autonomous attacks ushered cybercrime into AI era in 2025

    Malwarebytes urged companies to adopt continuous monitoring and lock down identity systems as AI models get better at orchestrating intrusions.

    By Feb. 4, 2026
  • software, code, computer
    Image attribution tooltip

    Markus Spiske

    Image attribution tooltip

    React2Shell exploitation undergoes significant change in threat activity

    Researchers see a sudden consolidation of source IPs since late January.

    By Updated Feb. 4, 2026
  • An image of a digital lock is shown
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Critical flaws in Ivanti EPMM lead to fast-moving exploitation attempts

    Security researchers warn that the initial threat activity was highly targeted, as a limited number of users were impacted prior to disclosure.

    By Feb. 3, 2026
  • 2026 background, symbolizing future technologies and innovations in a high-tech environment.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Cybersecurity 2026: AI, CISA, manufacturing sector all in the hot seat

    A look at the most important trends and issues in cyber this year.

    By Cybersecurity Dive Staff • Jan. 30, 2026
  • The Oracle logo on a building at an the technology company's campus on March 10, 2025 in Redwood Shores, California.
    Image attribution tooltip
    Justin Sullivan / Staff via Getty Images
    Image attribution tooltip

    Cisco sees vulnerability exploitation top phishing in Q4

    The company’s recommendations included monitoring for abuses of multifactor authentication, a growing threat to the enterprise.

    By Jan. 30, 2026
  • Hooded hacker sits in front of computer screens.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CISA, security researchers warn FortiCloud SSO flaw is under attack

    The exploitation activity comes weeks after a similar authentication bypass vulnerability was found.

    By Jan. 29, 2026
  • An artist's rendering of 3D shapes with AI, signifying a creative display of technology.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Corporate workers lean on shadow AI to enhance speed

    A report shows senior corporate executives are willing to allow unsanctioned AI use, which could place company data at risk.

    By Updated Jan. 28, 2026
  • Seven different icons for different artificial intelligence apps display side by side on a phone screen.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    AI tools break quickly, underscoring need for governance

    In a new report, the security firm Zscaler said it identified severe vulnerabilities in every enterprise tool it tested — sometimes on its first prompt.

    By Jan. 28, 2026
  • Nurses wearing surgical masks look at a computer in a hospital
    Image attribution tooltip
    Win McNamee via Getty Images
    Image attribution tooltip

    Interconnectedness, extortion risk make cybersecurity a healthcare C-suite priority

    A new report from Trellix reviews the biggest breaches, describes the most effective defenses and profiles the most dangerous attackers.

    By Jan. 27, 2026
  • A large entrance sign that reads "Gate A, NIST, National Institute of Standards and Technology, U.S. Department of Commerce" is mounted on a rock base and surrounded by grass and trees. In the background to the left of the sign, there is a commercial building.
    Image attribution tooltip
    R. Eskalis/NIST. Retrieved from NIST.
    Image attribution tooltip

    NIST is rethinking its role in analyzing software vulnerabilities

    As the agency’s vulnerability database buckles under a flood of submissions, it’s planning to shift some responsibilities to other parties.

    By Jan. 23, 2026
  • Cyberattack and internet crime, hacking and malware concepts.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Critical flaw in Fortinet FortiSIEM targeted in exploitation threat

    Researchers originally disclosed the vulnerability in August 2025, however, a proof of concept and an advisory were just released.

    By Jan. 16, 2026
  • Dozens of lines of computer code on a monitor.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Critical flaw in AWS Console risked compromise of build environment

    The CodeBreach vulnerability could have enabled a massive supply chain attack, researchers warn.

    By Updated Jan. 15, 2026
  • Glowing AI chip with digital circuits and rising candlestick charts
    Image attribution tooltip
    peshkov via Getty Images
    Image attribution tooltip

    Critical vulnerability found in n8n workflow automation platform

    The open-source platform is widely used across enterprise environments, leaving thousands of instances at risk.

    By Jan. 12, 2026
  • A cell tower is seen in a close-up shot
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Telecom sector sees steady rise in ransomware attacks

    A new threat intelligence report described a potent mix of unpatched flaws and lax perimeter controls.

    By Jan. 9, 2026
  • Seven different icons for different artificial intelligence apps display side by side on a phone screen.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Risky shadow AI use remains widespread

    A new report offers fresh evidence for why enterprises should prioritize AI governance policies.

    By Jan. 6, 2026
  • cybersecurity, matrix, abstract
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Thousands of firewalls at risk as legacy flaw in Fortinet faces renewed threat

    The company in December warned of recent attacks targeting a 2020 vulnerability.

    By Updated Jan. 5, 2026
  • A close-up digital illustration portrays cybersecurity with a futuristic theme
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    WatchGuard warns critical flaw in Firebox devices facing exploitation

    The company said the threat activity is part of a larger campaign against edge devices and internet-exposed infrastructure.

    By Updated Dec. 23, 2025