News

Recent investigations have unveiled alarming security vulnerabilities in children’s smartwatches, revealing the presence of ...
CISA urges federal agencies to immediately patch an exploited arbitrary file write vulnerability in Git that leads to remote ...
CERT/CC has disclosed the details of information exposure vulnerabilities in a Workhorse Software application after patches were released.
With vulnerability exploitation nearly doubling and critical weaknesses continuing to rise, it's clear that threat actors are accelerating their efforts while software ecosystems grow more complex.
The term “In the Wild” is broadly used to refer to any activity that has been observed outside of a controlled environment.
The vulnerabilities were discovered in various popular open-source software, such as the audio and video library FFmpeg and the image-editing suite ImageMagick. While a human expert is involved in ...
The discoveries by an AI-based bug hunter are significant, as it shows these tools are starting to get real results, even if ...
Exiger, the market-leading supply chain AI company and largest provider of supply chain technology to the U.S. Federal ...
This white paper recommends a core set of high-level secure software development practices, called a secure software development framework (SSDF), to be added to each software development life cycle ...
Xfinity notifies its customers of data breach linked to software vulnerability Xfinity said there was unauthorized access to internal systems as a result of this vulnerability, which was previously ...
IBM’s X-Force research and development team studies vulnerability disclosures and collects other data on Web-based attacks. In 2009, the team recorded 6,601 new vulnerabilities, which is 11 ...
A new report from Risk Based Security found 2016 set the all-time high record for the number of software vulnerabilities disclosed: 15,000.