Get the latest federal technology news delivered to your inbox. Despite goals set last year by the National Institute of Standards and Technology to process a backlog of unanalyzed cybersecurity ...
The U.S. government today extended a contract through which it finances the CVE Program, the cybersecurity industry’s go-to database of software vulnerabilities. The U.S. Cybersecurity and ...
Morning Overview on MSN
Exploits now arrive 10 hours after a vulnerability is published — down from days just two years ago
When Ivanti disclosed critical flaws in its Connect Secure VPN gateway in January 2024, attackers had working exploits ...
Morning Overview on MSN
Microsoft’s May Patch Tuesday fixes 138 vulnerabilities — a critical DNS flaw scores 9.8 and could compromise entire networks
Microsoft’s May 2026 Patch Tuesday release addresses 138 security vulnerabilities across Windows and related products, but ...
Researcher Ryan Dewhurst released the WPScan Vulnerability Database, a database housing security vulnerabilities in WordPress core code, plug-ins and themes. It’s available for pen-testers, WordPress ...
Organizations traditionally have struggled to track vulnerabilities in public cloud platforms and services because of the lack of a common vulnerability enumeration (CVE) program like the one that ...
Juhan Lepassaar, Executive Director at ENISA. Image: Hubert Burda Media/Flickr The announcement comes after concerns that the US government would stop funding the operations of MITRE, the nonprofit ...
The National Vulnerability Database (NVD) is well known in IT security as the source of record for all vulnerabilities which have been assigned a CVE (Common Vulnerabilities and Exposures) enumeration ...
The European Union Agency for Cybersecurity (Enisa) has debuted a European Union Vulnerability Database (EUVD) to provide “aggregated, reliable and actionable” information on newly disclosed cyber ...
Vulnerability databases are platforms that collect, maintain and share information about software and system vulnerabilities. These databases can be public or private and are often maintained by ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results