Samsung has issued a security warning confirming a serious vulnerability in its Samsung Magician SSD management software that is actively being exploited. The flaw affects Samsung Magician versions ...
The WinRAR vulnerability tracked as CVE-2025-8088 was discovered and patched in July 2025, but the popular file archiver continues to suffer from its fallout. According to ...
Automated reconnaissance coupled with mass exploitation of vulnerabilities have helped ransomware-as-a-service (RaaS) groups to thrive in the past few quarters, ReliaQuest has warned. The threat ...
Microsoft has released emergency security updates to patch a high-severity Office zero-day vulnerability exploited in attacks ...
CISA has flagged a critical VMware vCenter Server vulnerability as actively exploited and ordered U.S. federal agencies to secure their servers within three weeks.
HOUSTON, May 15, 2025 /PRNewswire/ -- Action1, a leading provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year ...
Software vulnerability management has emerged as a cornerstone of modern cybersecurity, combining technical strategies for identifying and patching vulnerabilities with sophisticated economic models ...
This story was originally published on Cybersecurity Dive. To receive daily news and insights, subscribe to our free daily Cybersecurity Dive newsletter. Security researchers warn that hackers are ...
German software company SAP has finally disclosed and fixed a highly critical vulnerability in the NetWeaver Visual Composer development server after evidence of exploitation in the wild. NetWeaver ...
A critical CrushFTP vulnerability now under exploitation in the wild has become mired in controversy and confusion. On March 31, the Shadowserver Foundation reported that exploitation activity was ...
For a software vendor, telling the world about the latest security vulnerability is always a delicate balancing act. Customers need information quickly, starting with the flaw’s severity rating and ...