Yubico has confirmed a partial 2FA bypass issue could impact some YubiKey customers—here’s what you need to know.
According to Ivanti, CVE-2025-0282 is a so-called stack overflow vulnerability. Such exploits enable hackers to write more ...
Let’s have a look at our research highlights for the year 2024! To keep up with the latest security research and share our ...
Cybersecurity vulnerabilities pose significant risks to organizations in today’s digital landscape. Left unaddressed, these vulnerabilities can lead to data breaches, financial losses, and ...
The San Francisco-based company said the issue has the potential to put millions of American users' data at risk simply by ...
Package Reputation is an essential capability for organizations seeking to secure their software supply chain. By analyzing ...
Threat actors are exploiting a recent GFI KerioControl firewall vulnerability that leads to remote code execution.
Large language models (LLMs) are proving to be valuable tools for discovering zero-days, bypassing detection, and writing ...
Australia's official cybersecurity watchdogs are alerting that a critical vulnerability that affects Fortinet firewalls is ...
AVM provides an alternative, allowing SecOps and DevOps teams to see what actual vulnerabilities exist in production ...
Adam Borg, an analyst from Stifel Nicolaus, has initiated a new Hold rating on Tenable Holdings (TENB).Stay Ahead of the Market:Discover ...
Application security startup Contrast Security Inc. today announced the release of Application Vulnerability Monitoring, a ...