See how you can use Tenable Hexa AI to determine in minutes if you’re impacted by the Axios npm supply chain attack. Learn how easy it is to automate configuration of scans, identify impacted assets, ...
Mark J Cox, one of the founding members of the Apache Software Foundation and the OpenSSL project, today posted a tweet warning users about a recently discovered important flaw in Apache HTTP Server ...
In an era where headlines about data breaches, ransomware attacks, and spyware run rampant, it’s easy to become desensitized. Former ...
Add Yahoo as a preferred source to see more of our stories on Google. To those who aren’t familiar, though, Brown is an academic and a podcaster who’s also a research professor at the University of ...
Google paid over $17 million to 747 security researchers who reported security bugs through its Vulnerability Reward Program (VRP) in 2025. The company says it has awarded over $81.6 million in bug ...
Over the past decade, vulnerability has become one of the most celebrated leadership virtues. We’ve collectively learned that sharing more builds trust, openness equals authenticity, and that the ...
New York, 27 January 2026 — United Nations Secretary-General António Guterres has appointed 15 leading experts to the Independent Expert Advisory Panel for the Multidimensional Vulnerability Index ...
Attackers have upped the ante in their exploits of a recently-disclosed maximum severity vulnerability in React Server Components (RSC), Next.js, and related frameworks. Attackers initially exploited ...
Why third-party software risks don’t end at deployment — and how banks and fintechs can stay ahead of them. In today’s financial ecosystem, banks and fintech firms are deeply dependent on third-party ...
Users of Dell systems are currently at considerable risk: a “high impact” vulnerability (CVE-2025-46430) has been identified in Dell’s Display and Peripherals Manager (DDPM). According to Dell, ...
The accelerating sophistication of cyberattacks poses unprecedented challenges for national security, critical infrastructures, and global digital resilience. Traditional signature-based defenses have ...