vulnerability-management
AI drastically speeds up cyberattacks, but proper identity and security hygiene can slow them down.
The Cybersecurity and Infrastructure Security Agency has updated its Known Exploited Vulnerabilities list to include high-severity flaws...
OpenWebUI servers targeted for extensive cryptomining Misconfigured instances of the widely used open-source OpenWebUI AI servers have...
Multiple nation-state threat operations and commercial spyware vendors have leveraged the new DarkSword iOS exploit kit, which...
Attacks exploiting the maximum severity insecure deserialization zero-day vulnerability in Cisco Secure Firewall Management Center software, tracked...
The vulnerability arises from the interaction between snap-confine, which manages secure application environments, and systemd-tmpfiles, responsible for...
The vulnerabilities, discovered by Eclypsium across four different products including GL-iNet Comet RM-1, Angeet/Yeeso ES3 KVM, Sipeed...
The vulnerability enables attackers to extract and misuse ASP.NET machine keys, facilitating unauthorized session authentication.
AI agent development and deployment platform LangSmith and high-performance large language model serving framework SGLang have been...