Critical remote code execution and database theft flaws highlight patching gaps and the hidden risk inside business ...
Two vulnerabilities can be exploited to fully compromise instances of the Google Looker business intelligence platform.
Get the latest federal technology news delivered to your inbox. Despite goals set last year by the National Institute of Standards and Technology to process a backlog of unanalyzed cybersecurity ...
A decade-old critical security vulnerability affects over 800,000 internet-exposed telnet servers, with reports of active ...
Network and security vulnerabilities were linked to more than 60% of zero-day exploits targeting enterprise technologies in 2024, according to a recent report from the Google Threat Intelligence Group ...
Keysight Technologies’ Ixia Vision product family has been found to contain critical security vulnerabilities that could allow remote attackers to compromise affected devices. According to a newly ...
Cybersecurity company CrowdStrike Holdings Inc. today announced new capabilities for its CrowdStrike Falcon Exposure Management offering that accelerate cybersecurity consolidation by eliminating ...
The U.S. government today extended a contract through which it finances the CVE Program, the cybersecurity industry’s go-to database of software vulnerabilities. The U.S. Cybersecurity and ...
The European Union Agency for Cybersecurity (Enisa) has debuted a European Union Vulnerability Database (EUVD) to provide “aggregated, reliable and actionable” information on newly disclosed cyber ...
This voice experience is generated by AI. Learn more. This voice experience is generated by AI. Learn more. A new vulnerability database has launched in the EU, in a bid to reduce dependence on the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results