- Home
- Cybercrime and Ransomware
- Emerging Tech
- Threat Intelligence
- Expert Insights
- Careers and Learning
- Compliance
Subscribe to Updates
Subscribe to our newsletter and never miss our latest news
Subscribe my Newsletter for New Posts & tips Let's stay updated!
Browsing: vulnerability management
Summary Points The European organization has launched GCVE, a decentralized system for assigning vulnerability identifiers,…
EU Proposes New Cybersecurity Law to Strengthen Digital Defense and Secure Supply Chains
Essential Insights The EU’s new cybersecurity package, including the revised Cybersecurity Act and amendments to…
Summary Points Google disclosed two high-severity zero-day vulnerabilities (CVE-2025-48633 and CVE-2025-48572) affecting Android, potentially exploited…
Fast Facts CISOs are experiencing record burnout due to constant threats, limited resources, complex regulations,…
Summary Points Fortinet’s critical web application firewall vulnerability (CVE-2025-64446) was exploited in the wild for…
Quick Takeaways A nation-state attacker stole F5’s source code and details on 44 vulnerabilities, but…
Forescout Unveils Rapidly Growing xIoT Ecosystem Outpacing Critical Infrastructure Security
Top Highlights Over 65% of connected assets in modern networks are non-traditional IT devices, including…
Fast Facts Attackers are actively exploiting a critical Windows Server Update Services vulnerability (CVE-2025-59287), bypassing…
Essential Insights A high-severity vulnerability (CVE-2025-62518, CVSS 8.1) was discovered in an abandoned Rust async-tar…
Microsoft Patches 175 Vulnerabilities, Including Two Zero-Days Under Active Exploitation
Essential Insights Microsoft disclosed 175 vulnerabilities in its core products, including two actively exploited zero-days…