Special Report Building Bridges: Overcoming Silos to Bring Organizations to the Next Level Silos limit not just the security team, but the entire organization. Jordyn Alger October 2, 2025 Poor visibility can leave organizations vulnerable, which is why it is time for companies to bridge internal silos.Read More
WhatsApp Flaw Added to CISA’s Known Exploited Vulnerabilities Catalog Jordyn Alger September 5, 2025 CISA has announced the addition of two vulnerabilities to its Known Exploited Vulnerabilities catalog. Read More
Hackers Observed Patching Leveraged Linux Exploit Jordyn Alger August 27, 2025 An Apache ActiveMQ flaw is being actively exploited. Then, it’s being patched by the actors who leveraged it. Read More
28K Exchange Servers Remain Unpatched Jordyn Alger August 13, 2025 CISA has issued an emergency directive in response to a vulnerability affecting hybrid Microsoft Exchange users.Read More
System Collapses Are Preventable, Not Unpredictable Security Staff August 12, 2025 Research suggests that when systems collapse, it is most likely due to a preventable error rather than an unpredictable event. Read More
AI Introduces Security Vulnerabilities Within Code in 45% of Cases Security Staff July 31, 2025 A recent report by Veracode revealed that while AI produces functional code, it introduces security vulnerabilities in 45% of cases.Read More
Global News & Analysis Researchers Found Nearly 600 Incidents of AI Fraud Taelor Sutherland July 23, 2025 Managing browser-based vulnerabilities.Read More
75% of Organizations’ Building Systems Affected by Exploited Vulnerabilities Security Staff July 16, 2025 75% of organizations have building management systems with known exploited vulnerabilities.Read More
4 Critical, Known Exploited Vulnerabilities Added to KEV Catalog Jordyn Alger July 14, 2025 CISA added 4 new vulnerabilities to the Known Exploited Vulnerabilities (KEV) Catalogue, citing evidence of active exploitation. Read More
Sudo Vulnerability Discovered, May Exposes Linux Systems Jordyn Alger July 11, 2025 Sudo, the privileged command-line tool often installed on Linux systems, has two local privilege vulnerabilities. Read More