As the agency’s vulnerability database buckles under a flood of submissions, it’s planning to shift some responsibilities to other parties.
MorganAsh has launched a gap analysis service to help firms assess how their current approach to customer vulnerability ...
"Taxonomy of purposes, methods, and recommendations for vulnerability analysis" Bonham, N., Kasprzyk, J., Zagona, E., (2024) “Taxonomy of purposes, methods, and ...
In December 2025, CVE-2025-55182 (React2Shell), a vulnerability in React Server Components (RSC) that enables remote code execution (RCE), was publicly disclosed. Shortly after publication, multiple ...
A leading U.S.-managed database of cybersecurity vulnerabilities has a processing backlog so extensive that, at current rates, it likely won’t be cleared up until early 2025, a new analysis shows. The ...
AI assistants are a double-edged sword for developers. On one hand, code-generation assistants have made creating barebones applications easier and led to a surge in code pushed to GitHub. Yet just as ...
As COVID-19 caused widespread panic and threw the world into disarray, cyber-criminals were hard at work trying to take advantage of the situation. From phishing scams to malware-infected websites, ...
Google LLC’s Threat Analysis Group today warned users of a vulnerability in file archiving and compressing software WinRAR that’s being actively exploited by hacking groups, including allegedly ...