The cybersecurity landscape is constantly evolving, with new threats emerging at an alarming rate. …
Known Exploited Vulnerabilities
-
-
AI in Software DevelopmentEmail CommunicationHealthcare IT Security
CISA Adds Erlang SSH and Roundcube Flaws to Known Exploited Vulnerabilities Catalog
by Priya Kapoorby Priya Kapoor 2 minutes readThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently made significant updates to its …
-
AI in CybersecurityAI Technology Providers
Questions Swirl Around ConnectWise Flaw Used in Attacks
by Jamal Richaqrds 2 minutes readIn recent news, ConnectWise has been in the spotlight due to a vulnerability that …
-
3D printing technologyAI in Cybersecurity
New Chrome Zero-Day Actively Exploited; Google Issues Emergency Out-of-Band Patch
by David Chenby David Chen 2 minutes readIn a recent turn of events, Google has swiftly responded to a critical security …
-
AI in CybersecurityCorporate Data ProtectionIT security
Commvault CVE-2025-34028 Added to CISA KEV After Active Exploitation Confirmed
by Priya Kapoorby Priya Kapoor 2 minutes readIn a significant development for cybersecurity professionals, the U.S. Cybersecurity and Infrastructure Security Agency …
-
AI in CybersecurityIT securitySoftware Security
CISA Adds Actively Exploited Broadcom and Commvault Flaws to KEV Database
by Nia Walkerby Nia Walker 2 minutes readThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently made a significant move …
-
AI in CybersecurityIT security
CVE-2025-24054 Under Active Attack—Steals NTLM Credentials on File Download
by Samantha Rowland 2 minutes readIn a recent development that has sent ripples through the cybersecurity community, the U.S. …
-
AI in CybersecurityCloud SecurityData Security
CISA Warns of CentreStack’s Hard-Coded MachineKey Vulnerability Enabling RCE Attacks
by Lila Hernandez 2 minutes readThe recent warning from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) regarding CentreStack’s …
-
Artificial intelligence in cybersecurityIT securityRetail Technology
CISA Adds Five Actively Exploited Vulnerabilities in Advantive VeraCore and Ivanti EPM to KEV List
by Jamal Richaqrds 1 minutes readThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) continues to be at the forefront …
-
AI in Software DevelopmentArtificial intelligence in cybersecurity
CISA Adds Microsoft and Zimbra Flaws to KEV Catalog Amid Active Exploitation
by Lila Hernandez 2 minutes readIn a move that underscores the evolving landscape of cybersecurity threats, the U.S. Cybersecurity …
- 1
- 2