Vulnerability


  • software developers using computer to write code sitting at desk with multiple screens work remotely in home at night.
    Image attribution tooltip
    MTStock Studio via Getty Images
    Image attribution tooltip

    Software vulnerabilities pile up at government agencies, research finds

    A Veracode report reveals that government networks have accumulated years of unresolved security flaws, putting them at serious risk of exploitation.

    By June 12, 2025
  • Microsoft CEO Satya Nadella speaks during the OpenAI DevDay event on November 06, 2023 in San Francisco, California.
    Image attribution tooltip
    Justin Sullivan / Staff via Getty Images
    Image attribution tooltip

    Critical flaw in Microsoft Copilot could have allowed zero-click attack

    Researchers said the vulnerability, dubbed “EchoLeak,” could allow a hacker to access data without any specific user interaction.

    By Updated 22 hours ago
  • AI Artificial Intelligence technology for data analysis
    Image attribution tooltip
    Khanchit Khirisutchalual via Getty Images
    Image attribution tooltip

    From malware to deepfakes, generative AI is transforming attacks

    Generative AI is even helping hackers trick open-source developers into using malicious code, according to Gartner.

    By June 10, 2025
  • Header image for "Financial Industry is Third-Most Targeted By Hackers"
    Image attribution tooltip
    Andrew Brookes
    Image attribution tooltip

    SentinelOne rebuffs China-linked attack — and discovers global intrusions

    The security firm said the operatives who tried to breach it turned out to be responsible for cyberattacks on dozens of critical infrastructure organizations worldwide.

    By Updated June 9, 2025
  • representing a digital landscape
    Image attribution tooltip
    Permission granted by ThreatLocker
    Image attribution tooltip
    Sponsored by ThreatLocker

    Understanding the evolving malware and ransomware threat landscape

    Cyber threats like ransomware and malware are rising fast, hitting firms like Frederick Health and Marks & Spencer. Defense needs layers, adaptability and vigilance.

    By Farid Mustafayev, Senior Software Engineer, ThreatLocker • June 9, 2025
  • Man standing in a suit in front of a U.S. and EPA flags.
    Image attribution tooltip
    (2025). "EPA Administrator Lee Zeldin Launches the Greatest Day of Deregulation in American History" [Video]. Retrieved from U.S. Environmental Protection Agency.
    Image attribution tooltip

    Water utilities mitigate equipment flaws after researchers find widespread exposures

    Censys researchers said hundreds of water treatment facilities have taken steps to protect against malicious cyber intrusions.

    By June 5, 2025
  • An aerial view of the Shotwick Solar Energy Park on February 25, 2025 in Deeside, Wales.
    Image attribution tooltip
    Christopher Furlong via Getty Images
    Image attribution tooltip

    Vast array of solar power equipment left exposed online

    The most commonly exposed device has been discontinued and vulnerable for a decade, new research found.

    By June 4, 2025
  • ndustry Factory Female Industrial Engineer Works on the Personal Computer on the Turbine/ Engine Project in 3D Using CAD Program.
    Image attribution tooltip

    ShutterStock/#761906881

    Image attribution tooltip
    Sponsored by Rockwell Automation

    Build more robust OT security with the NIST framework

    Access your guide below and start your journey towards resilient, secure OT operations using the NIST framework.

    June 2, 2025
  • close up of a worker holding  up a tablet
    Image attribution tooltip
    Dragos Condrea via Getty Images
    Image attribution tooltip

    Outage disrupts some SentinelOne services

    Company executives said there was no indication the incident was the result of a security issue.

    By May 29, 2025
  • An illustration of a calendar, with a mouse cursor clicking on a day
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    Google: China-backed hackers hiding malware in calendar events

    The APT41 nation-state threat group is exploiting yet another cloud service to mask its operations, according to new research.

    By May 29, 2025
  • Broadband connections
    Image attribution tooltip
    NicoElNino via Getty Images
    Image attribution tooltip

    Thousands of ASUS routers compromised in sophisticated hacking campaign

    Researchers have previously linked the suspected threat actor, dubbed ViciousTrap, to the exploitation of Cisco routers.

    By May 29, 2025
  • A cargo pallet filled with rockets and covered in safety straps sits on a tarmac at night.
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    Microsoft, Dutch government discover new Russian hacking group

    The findings highlight the vulnerability of all critical infrastructure firms to similar attack methods.

    By Updated May 28, 2025
  • More than two dozen world leaders, tech executives, and experts stand in several rows on blue carpeted steps in front of a backdrop that says "AI Safety Summit"
    Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    US, allies recommend security protections for AI models

    The joint guidance comes as officials fear how hackers could manipulate AI systems, especially in critical infrastructure.

    By May 22, 2025
  • Cyberhackers-Ransomware
    Image attribution tooltip
    (Gorodenkoff) via Getty Images
    Image attribution tooltip

    Ivanti Endpoint Mobile Manager customers exploited via chained vulnerabilities

    The company said additional CVEs may be necessary for flaws in related open-source libraries, but researchers are raising questions.  

    By Updated May 20, 2025
  • A woman wearing a surgical mask stands in front of a booth for the Chinese networking company TP-Link at a German consumer electronics trade show.
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    GOP lawmakers urge ban of networking vendor TP-Link, citing ties to China

    The Trump administration is facing mounting pressure to formulate a strategy for addressing supply-chain threats that endanger national security.

    By May 15, 2025
  • An SAP logo is seen on a building in Frankfurt, Germany, on September 1, 2024.
    Image attribution tooltip
    Victor Golmer via Getty Images
    Image attribution tooltip

    SAP NetWeaver exploitation enters second wave of threat activity

    Researchers are tracking hundreds of cases around the world and warning that the risk is more serious than previously known.

    By May 9, 2025
  • exclamation point depicted hovering above network infrastructure
    Image attribution tooltip
    Just_Super/Getty Images via Getty Images
    Image attribution tooltip

    Ransomware claims dipped slightly in 2024, cyber insurer says

    A major cyber insurer’s annual report lays out how hackers are trying to steal money and how its policyholders responded.

    By May 7, 2025
  • chief legal officer serving as corporate secretary
    Image attribution tooltip
    rorodenkoff via Getty Images
    Image attribution tooltip

    Operational impacts top list of vendor risk worries, study finds

    The report comes as years of supply chain cyberattacks shine a spotlight on third-party risks.

    By May 1, 2025
  • A text bubble labeled "AI" alludes to an image of ChatGPT.
    Image attribution tooltip
    Stock Photo via Getty Images
    Image attribution tooltip

    AI-fueled cybercrime may outpace traditional defenses, Check Point warns

    The security firm said in a new report that defenders should begin using AI to counter cyber criminals’ adoption of the technology.

    By April 30, 2025
  • SAP logo displayed on a building in Walldorf, Germany on July 29, 2024.
    Image attribution tooltip
    Victor Golmer via Getty Images
    Image attribution tooltip

    Critical vulnerability in SAP NetWeaver Visual Composer leads to confirmed compromises

    Thousands are exposed and potentially vulnerable as researchers warn of widespread exploitation.   

    By Updated April 30, 2025
  • Cyber security  firewall interface protection concept. Businesswoman protecting herself from cyber attacks. Personal data security and banking
    Image attribution tooltip
    Getty Images via Getty Images
    Image attribution tooltip

    Zero-day exploitation drops slightly from last year, Google report finds

    Google’s threat intelligence team said software vendor security practices are making it harder for hackers to find flaws in some platforms.

    By April 29, 2025
  • The FBI seal
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    FBI seeks public tips about Salt Typhoon

    The bureau’s public alert follows months of conversations with the telecom industry about the far-reaching cyber espionage campaign by a Chinese nation-state threat actor.

    By April 28, 2025
  • An SAP logo is seen on a building in Frankfurt, Germany, on September 1, 2024.
    Image attribution tooltip
    Victor Golmer via Getty Images
    Image attribution tooltip

    Critical vulnerability in SAP NetWeaver under threat of active exploitation

    Attackers have been observed dropping webshell backdoors and researchers warn the application is popular among government agencies.

    By Updated April 25, 2025
  • Green lights show behind plugged-in cables.
    Image attribution tooltip
    gorodenkoff/iStock via Getty Images
    Image attribution tooltip

    Threat groups exploit resurgent vulnerabilities

    VPNs, routers and firewalls are being targeted via older CVEs, new GreyNoise research shows.

    By April 24, 2025
  • The FBI seal
    Image attribution tooltip
    Chip Somodevilla via Getty Images
    Image attribution tooltip

    BEC scams, investment fraud accounted for biggest cybercrime losses in 2024

    Americans lost $16.6 billion to cyber fraud last year, according to an FBI report, with phishing, spoofing and extortion topping the list of complaints.

    By April 23, 2025