Sunday, May 3, 2026
Cybersecurity News
Industry News
Expert Insights
Webinars
Learning Center
Topics
About
Sponsor
Cybersecurity News
Industry News
Expert Insights
Webinars
Learning Center
Topics
About
Sponsor
Articles by Topic:
Vulnerability Management (VM)
Critical Flaws in Veeam Service Provider Console Demand Urgent Action
January 17, 2025
Veeam, a provider of data replication and protection software, released critical security patches to fix severe vulnerabilities affecting its Service Provider Console (VSPC). One of the vulnerabilities is rated as critical (9.9/10 on the CVSS…
Read More >
Breaking Down the 2024 CWE Top 25: Addressing the Most Dangerous Software Weaknesses
January 10, 2025
A new year is a time for reflection. Looking at what happened in the prior year and setting goals for the future year. This applies to all activities, including software weaknesses. The Cybersecurity and Infrastructure…
Read More >
Cisco ASA Vulnerability Resurfaces as Active Threat
January 07, 2025
A security vulnerability from ten years ago has recently been exploited in the wild again: CVE-2014-2120, first recognized in March 2014, is a vulnerability in Cisco Adaptive Security Appliance’s (ASA) WebVPN login page. In November…
Read More >
Decade-Old Vulnerabilities in Ubuntu's 'needrestart' Utility Exposed
December 29, 2024
“How did I not see that?” is the refrain when something new is discovered after the fifth watching of a movie. Software security vulnerability researchers also have those moments. For over a decade, five critical…
Read More >
Mounting Security Debt Is Putting Financial Services at Risk
November 22, 2024
Many financial institutions have a debt problem. Not a monetarily but a software security one. Veracode’s State of Software Security 2024 study reports that over three out of four (76%) financial organizations have security debt,…
Read More >
Cybercriminals Shave Exploitation Times to Record Lows: Can Organizations Keep Pace?
November 06, 2024
The amount of time it takes for a vulnerability to be exploited after discovery, or time-to-exploit (TTE), is on the decline as cybercriminals are always honing their techniques and adapting their attacks for optimal efficiency…
Read More >
Cyber Teams Say They Can’t Keep Up with Attack Volumes
October 01, 2024
Cybersecurity teams are struggling to keep up with the increasing volume of cyberattacks, according to a new report. Many teams feel overwhelmed by the sheer number of threats, which continue to grow in complexity and…
Read More >
Ahead of Mandatory Rules, CISA Unveils New Cyber Incident Reporting Portal
August 29, 2024
Take a look at CISA's launch of a new cyber incident reporting portal ahead of mandatory rules for organizations. The portal aims to streamline the process of reporting cyber incidents, helping CISA to more effectively…
Read More >
Chinese Hackers Exploited Bug to Compromise Internet Companies, Cybersecurity Firm Says
August 28, 2024
Chinese hackers exploited a vulnerability to compromise several internet companies, according to a cybersecurity firm's report. The attack leveraged a previously unknown bug to infiltrate systems and potentially access sensitive data, raising concerns about the…
Read More >
Research Reveals Security Professionals Believe That Non-IT Leaders Don’t Understand Vulnerability Management
July 16, 2024
New research from Ivanti reveals a concerning gap in understanding between IT security professionals and non-IT leaders, with 55% of security experts believing that leadership doesn't grasp the importance of vulnerability management. This disconnect poses…
Read More >
Subscribe for the Latest News
Webinars
Tuesday, May. 12
1pm ET / 10am PT
Scaling Code Security for Builders Beyond Developer-First
Wednesday, May. 13
1pm ET / 10am PT
Cyber Resilience in Action: How IBM and Index Engines Deliver a Detection-to-Recovery Pipeline
Wednesday, May. 27
1pm ET / 10am PT
Passwordless Authentication: A Practical Approach to Modernizing Access