A new vulnerability database has launched in the EU, in a bid to reduce dependence on the U.S. program. Here's what you need ...
Critical vuln flew under the radar for a decade A recently disclosed critical vulnerability in the GNU InetUtils telnet ...
Forbes contributors publish independent expert analyses and insights. Kate O’Flaherty is a cybersecurity and privacy journalist. U.S. President Donald Trump has cut funding for the global database of ...
A vulnerability in a tightly isolated sandbox may score a 9.8 but never affect anything else. Meanwhile, a 5.2 in a single ...
The mission of the Common Vulnerabilities and Exposures (CVE®) Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. As a CNA, DTEX is authorized to assign CVE ...
A new service, the Global Cybersecurity Vulnerability Enumeration (GCVE), offers an alternative to the US-led CVE ...
MITRE loses its lead as the top reporter of vulnerabilities, while new organizations pump out CVEs and reported bugs in ...
Both platforms serve as backbone infrastructure for remote work and software development, making these flaws particularly dangerous for business continuity.
Japanese cybersecurity software firm Trend Micro has patched a critical security flaw in Apex Central (on-premise) that could allow attackers to execute arbitrary code with SYSTEM privileges.
Apple has revealed the one thing you can do to be safe from vulnerabilities to cyber criminals after 'attacks' on iPhones ...
The vulnerability, identified as CVE-2026-0628, is classified as high risk and is located in the WebView component, caused by ...
As for products, the biggest offender, with 56 patches to be applied, is the Zero Data Loss Recovery Appliance (ZDLRA); almost all are fixes for third-party components. Despite 34 of these being ...