News

The US system to track vulnerabilities is struggling to keep up with its backlog. Experts are scrambling to assemble ...
Hot on the heels of the U.S. bombing of Iranian nuclear facilities, a joint cybersecurity advisory has warned critical ...
Bug bounty programs (BBPs) crowdsource vulnerability discovery—enabling ethical hackers to identify and report flaws for ...
Festo summarizes its approach to security in its Security white paper for Festo controllers. The work of PSIRT is detailed on ...
United States authorities have been warning of potential state-linked or hacktivist threats since the U.S. intervened in the ...
CVE-2025-49696 is particularly worrisome, since it can be exploited via the Preview Pane in Office, meaning no serious user ...
With ongoing job cuts and resignations within the federal government, CISOs of smaller governments and private sector ...
WhatsApp uses Signal's encryption protocol, so your chats and calls are just as end-to-end encrypted as those on Signal. But the main distinction between Signal and WhatsApp is that the latter ...
Google has announced plans to make multi-factor authentication (MFA) mandatory for all Google Cloud users by the end of 2025, strengthening its security protocols. The initiative follows Google’s ...
The U.S. Cybersecurity & Infrastructure Security Agency has confirmed active exploitation of the CitrixBleed 2 vulnerability ...
CISA adds four critical vulnerabilities to its KEV list, with active exploitation confirmed. Federal agencies must update by ...
The U.S. cybersecurity agency gave federal agencies just one day to patch a security bug in Citrix Netscaler, which can be ...