KEV Collider combines data from multiple open-source vulnerability frameworks to help cybersecurity teams assess which issues ...
The initial wave of attacks in December led to hundreds of systems being compromised as state-linked threat groups and other ...
RapidFort raises $42M to scale a new approach to automated software supply chain security, and combat increasing vulnerability exploitation.
The Cybersecurity and Infrastructure Security Agency (CISA) in the U.S. warned of active exploitation of four vulnerabilities impacting enterprise software from Versa and Zimbra, the Vite frontend ...
RapidFort announced $42 million in Series A funding led by Blue Cloud Ventures and Forgepoint Capital, with participation ...
With vulnerability exploitation nearly doubling and critical weaknesses continuing to rise, it's clear that threat actors are accelerating their efforts while software ecosystems grow more complex.
German software company SAP has finally disclosed and fixed a highly critical vulnerability in the NetWeaver Visual Composer development server after evidence of exploitation in the wild. NetWeaver ...
Software vulnerability management has emerged as a cornerstone of modern cybersecurity, combining technical strategies for identifying and patching vulnerabilities with sophisticated economic models ...
Austin Gadient is CTO & cofounder of Vali Cyber. Vali’s product ZeroLock protects hypervisors and Linux systems from cyber attacks. Many organizations are familiar with patching, the standard practice ...
The continuous exploitation of traditional remote access technologies such as VPNs has been a recurring feature in the past year in cybersecurity. This trend has been growing since the huge surge in ...
The WinRAR vulnerability tracked as CVE-2025-8088 was discovered and patched in July 2025, but the popular file archiver continues to suffer from its fallout. According to ...
For a software vendor, telling the world about the latest security vulnerability is always a delicate balancing act. Customers need information quickly, starting with the flaw’s severity rating and ...