Vulnerability


  • A laser printer with printed documents sits unattended in an office.
    Image attribution tooltip
    deepblue4you via Getty Images
    Image attribution tooltip

    The humble printer highlights overlooked security flaws

    Failure to remediate known device vulnerabilities is a rampant problem, according to a study by HP.

    By Matt Ashare • Aug. 18, 2025
  • Generic java programming code written on black.
    Image attribution tooltip
    funky-data via Getty Images
    Image attribution tooltip

    Developers knowingly push vulnerable code, despite growing breach risk

    Only three in 10 respondents said their application security programs were highly mature.

    By Aug. 15, 2025
  • Microsoft building with logo
    Image attribution tooltip
    HJBC via Getty Images
    Image attribution tooltip

    CISA, Microsoft update guidance on Exchange Server vulnerability

    Officials reiterated their belief that hackers were not exploiting the flaw, but nonetheless urged users to immediately check their systems.

    By Aug. 13, 2025
  • A sign displayed outside Xerox headquarters
    Image attribution tooltip
    Courtesy of Xerox
    Image attribution tooltip

    Xerox patches critical vulnerability in FreeFlow Core application

    Researchers at Horizon3.ai discovered the flaw after flagging unusual behavior in a customer environment.

    By Updated Aug. 13, 2025
  • Exterior of Citrix office complex.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images
    Image attribution tooltip

    Citrix NetScaler flaws lead to critical infrastructure breaches

    Dutch authorities said hackers penetrated several critical infrastructure providers, in a warning sign for vulnerable organizations elsewhere.

    By Updated Aug. 12, 2025
  • AI agent touch screen.
    Image attribution tooltip
    Alexander Sikov via Getty Images
    Image attribution tooltip

    Research shows AI agents are highly vulnerable to hijacking attacks

    Experts from Zenity Labs demonstrated how attackers could exploit widely deployed AI technologies for data theft and manipulation.

    By Aug. 11, 2025
  • Six men stand on a stage. Three men hold an oversized $4 million check made out to "Team Atlanta," while two of the other men flank this trio and pose for a photo with them. The sixth person stands off to the side and applauds.
    Image attribution tooltip
    Eric Geller/Cybersecurity Dive
    Image attribution tooltip

    DARPA touts value of AI-powered vulnerability detection as it announces competition winners

    The U.S. military research agency hopes to foster a new ecosystem of autonomous vulnerability remediation.

    By Aug. 8, 2025
  • close up programmer man hand typing on keyboard laptop for register data system or access password at dark operation room , cyber security concept - stock photo
    Image attribution tooltip
    Chainarong Prasertthai via Getty Images
    Image attribution tooltip

    Financially motivated cluster a key player in ToolShell exploitation

    Researchers from Palo Alto Networks detail ransomware deployment and malicious backdoors in a campaign against Microsoft SharePoint users.

    By Aug. 8, 2025
  • exclamation point depicted hovering above network infrastructure
    Image attribution tooltip
    Just_Super/Getty Images via Getty Images
    Image attribution tooltip

    SonicWall says recent attack wave involved previously disclosed flaw, not zero-day

    The company said it had linked recent hacks to customers’ use of legacy credentials when migrating from Gen 6 to Gen 7 firewalls.

    By Aug. 7, 2025
  • a microsoft storefront in a city nightscape
    Image attribution tooltip
    Jeenah Moon via Getty Images
    Image attribution tooltip

    CISA, Microsoft warn about new Microsoft Exchange server vulnerability

    The flaw could enable a hacker to perform a “total domain compromise” on affected systems, CISA said.

    By Updated Aug. 7, 2025
  • Multiple cooling towers illuminated with red lights emit large plumes of steam into the night sky. The towers are reflected in a still body of water in the foreground, with a silhouetted tree and landscape between the towers and the water.
    Image attribution tooltip
    Alamy
    Image attribution tooltip

    Top US energy companies frequently exposed to critical security flaws

    A report from security firm SixMap shows that a large number of energy companies use equipment with vulnerabilities that are located on potentially exposed ports.

    By Aug. 6, 2025
  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Traitov/iStock/Getty via Getty Images
    Image attribution tooltip

    SonicWall investigating possible zero-day related to firewall attacks

    Researchers recently warned about a surge in Akira ransomware attacks linked to a potential SonicWall vulnerability.

    By Aug. 5, 2025
  • AI Artificial Intelligence Security, Digital Information Protected Secured Lock
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    AI is helping hackers automate and customize cyberattacks

    CrowdStrike’s annual cyber-threat-hunting report reveals the double threat that AI poses to many businesses.

    By Aug. 4, 2025
  • Team of hackers dressed in black work on computers in dark room.
    Image attribution tooltip
    gorodenkoff via Getty Images
    Image attribution tooltip

    Ransomware spike linked to potential zero-day flaw in SonicWall devices

    Researchers say hackers using the Akira ransomware strain may be exploiting the vulnerability en masse.

    By Updated Aug. 4, 2025
  • Exterior view of Microsoft's Vancouver office in Canada on December 22, 2023.
    Image attribution tooltip
    hapabapa via Getty Images
    Image attribution tooltip

    Palo Alto Networks investigating ransomware threat related to SharePoint exploitation

    Researchers said an unidentified hacker demanded a ransom after an intrusion linked to the SharePoint flaw.  

    By Aug. 1, 2025
  • A sign that says Illumina is on a curb in front of red brick buildings.
    Image attribution tooltip
    Courtesy of Illumina
    Image attribution tooltip

    DOJ reaches $9.8 million settlement with Illumina over cyber whistleblower claims

    The U.S. alleged the company knowingly sold genetic-sequencing systems with software vulnerabilities to federal agencies.

    By Updated Aug. 1, 2025
  • An artist's rendering of 3D shapes with AI, signifying a creative display of technology.
    Image attribution tooltip
    BlackJack3D via Getty Images
    Image attribution tooltip

    ‘Shadow AI’ increases cost of data breaches, report finds

    Companies are failing to protect their AI tools from compromise, often leading to more extensive data breaches, according to new data from IBM.

    By July 30, 2025
  • Cyber Security Ransomware
    Image attribution tooltip
    Just_Super via Getty Images
    Image attribution tooltip

    Ransomware attacks against oil and gas firms surge

    Manufacturing remains the No. 1 ransomware target, new data from Zscaler shows.

    By July 29, 2025
  • A businessperson with a generative AI brain concept above his hand
    Image attribution tooltip
    chombosan via Getty Images
    Image attribution tooltip

    Research shows LLMs can conduct sophisticated attacks without humans

    The project, launched by Carnegie Mellon in collaboration with Anthropic, simulated the 2017 Equifax data breach.

    By July 28, 2025
  • The flag of North Korea flies from a propaganda tower near the Demilitarized Zone with South Korea
    Image attribution tooltip
    Carl Court via Getty Images
    Image attribution tooltip

    Treasury sanctions North Koreans involved in IT-worker schemes

    Authorities also charged several of the indicted people with attempting to evade U.S. sanctions on North Korea.

    By July 25, 2025
  • The Department of Energy (DOE) sign is seen at its headquarters, the James Forrestal Building, nicknamed the Little Pentagon, in Washington, DC.
    Image attribution tooltip
    hapabapa via Getty Images
    Image attribution tooltip

    What we know about the Microsoft SharePoint attacks

    State-linked hackers and ransomware groups are targeting SharePoint customers across the globe.

    By July 24, 2025
  • The White House in Washington, D.C.
    Image attribution tooltip
    Alex Wong via Getty Images
    Image attribution tooltip

    Trump AI plan calls for cybersecurity assessments, threat info-sharing

    It remains unclear how federal agencies depleted by layoffs will be able to implement the strategy’s ambitious vision, which includes an ISAC dedicated to AI.

    By July 23, 2025
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    SharePoint hacking campaign affects hundreds of systems worldwide

    CISA is responding to potential compromises at federal agencies and various state and local entities.

    By Updated July 23, 2025
  • The Microsoft logo is seen at an Experience Center on Fifth Avenue on April 03, 2024 in New York City.
    Image attribution tooltip
    Michael M. Santiago via Getty Images
    Image attribution tooltip

    Microsoft sees China-backed nation-state hackers among adversaries targeting SharePoint

    The company urged customers to apply security updates as security researchers warn of escalating attacks.

    By July 22, 2025
  • a microsoft storefront in a city nightscape
    Image attribution tooltip
    Jeenah Moon via Getty Images
    Image attribution tooltip

    Microsoft, CISA warn of cyberattacks targeting on-premises SharePoint servers

    The flaw has already led to widespread compromises prior to Microsoft’s release of an emergency patch.

    By Updated July 21, 2025