#vulnerability-management

[ follow ]
Information security
fromThe Hacker News
2 days ago

What Boards Must Demand in the Age of AI-Automated Exploitation

AI-powered exploitation has eliminated the time constraints that previously made large vulnerability backlogs survivable, forcing organizations to immediately address security gaps or face rapid compromise.
fromThe Hacker News
2 days ago

Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days

This month, over half (55%) of all Patch Tuesday CVEs were privilege escalation bugs, and of those, six were rated exploitation more likely across Windows Graphics Component, Windows Accessibility Infrastructure, Windows Kernel, Windows SMB Server, and Winlogon. We know these bugs are typically used by threat actors as part of post-compromise activity, once they get onto systems through other means (social engineering, exploitation of another vulnerability).
Information security
Information security
fromSecurityWeek
3 days ago

Microsoft Patches 83 Vulnerabilities

Microsoft released 83 vulnerability patches in March 2026, including one critical remote code execution flaw and several privilege escalation bugs requiring attention.
Information security
fromSecurityWeek
3 days ago

Adobe Patches 80 Vulnerabilities Across Eight Products

Adobe released patches for 80 vulnerabilities across 8 products, with 19 critical flaws in Commerce and Magento requiring urgent patching within 30 days due to active threat targeting.
#cybersecurity-funding
European startups
fromSecurityWeek
3 days ago

Escape Raises $18 Million to Automate Pentesting

Escape raised $18 million in Series A funding to automate offensive security with AI agents that discover, test, and fix vulnerabilities within existing workflows.
Information security
fromSecurityWeek
3 days ago

Recent Ivanti Endpoint Manager Flaw Exploited in Attacks

CISA added three critical vulnerabilities to its Known Exploited Vulnerabilities catalog, requiring federal agencies to patch them within one to two weeks due to active exploitation threats.
Information security
fromThe Hacker News
3 days ago

CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited

CISA added three actively exploited vulnerabilities to its KEV catalog, including critical flaws in SolarWinds Web Help Desk, Omnissa Workspace One UEM, and Ivanti Endpoint Manager, with federal agencies required to patch by mid-to-late March 2026.
Information security
fromThe Hacker News
1 week ago

Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog

CISA added two critical vulnerabilities affecting Hikvision and Rockwell Automation products to its Known Exploited Vulnerabilities catalog due to active exploitation evidence.
Information security
fromSecuritymagazine
1 week ago

Would You Trust an AI Pentester to Work Solo?

AI-powered pentesting excels at speed and pattern recognition but requires human guidance to validate contextual vulnerabilities and novel attack paths that matter most to organizations.
fromTheregister
2 weeks ago

Rapid AI-driven development makes security unattainable

Security debt as 'known vulnerabilities left unresolved for more than a year' now affects 82 percent of companies, up from 74 percent a year ago. High-risk vulnerabilities, meaning flaws that are both severe and likely to be exploited, have risen from 8.3 percent to 11.3 percent.
Information security
Information security
fromSecurityWeek
3 weeks ago

Cogent Security Raises $42 Million for AI-Driven Vulnerability Management

Cogent Security raised $42M Series A to build autonomous AI agents that automate vulnerability investigation, prioritization, and remediation across environments.
fromSecurityWeek
4 weeks ago

Nucleus Raises $20 Million for Exposure Management

Integrating security and asset data from over 200 connectors, the platform unifies business context and AI-based intelligence into a single pane, offering visibility and enabling risk prioritization and reduction. Nucleus relies on automation to enhance customers' vulnerability management programs. It correlates flaws with real-world threat data from multiple sources, normalizes it, maps assets to specific teams, and uses workflows for faster remediation. According to Nucleus, its vendor-agnostic approach covers exposure across tools, users, environments, and business units, unifies context, and enables coordinated action.
Venture
Information security
fromComputerWeekly.com
4 weeks ago

CVE volumes may plausibly reach 100,000 this year | Computer Weekly

Disclosed CVEs may exceed 50,000 in 2026, with realistic scenarios reaching 70,000–100,000 and an urgent need to scale and prioritise vulnerability response.
#cisa-kev
#cisa
fromTechCrunch
3 months ago
Information security

CISA warns federal agencies to patch flawed Cisco firewalls amid 'active exploitation' across the US government | TechCrunch

fromTechCrunch
3 months ago
Information security

CISA warns federal agencies to patch flawed Cisco firewalls amid 'active exploitation' across the US government | TechCrunch

#cybersecurity
fromFortune
2 months ago
Information security

Invictus-backed cybersecurity company ThreatModeler acquires competitor IriusRisk for over $100 million | Fortune

Information security
fromTheregister
4 months ago

Ex-CISA chief says AI could mean the end of cybersecurity

AI accelerates both attacker capabilities and vulnerability discovery; secure-by-design software and strong AI governance could make breaches rare anomalies rather than routine costs.
fromFortune
2 months ago
Information security

Invictus-backed cybersecurity company ThreatModeler acquires competitor IriusRisk for over $100 million | Fortune

#software-supply-chain
#ai-security
Information security
fromThe Hacker News
1 month ago

ThreatsDay Bulletin: New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

Small, quiet shifts across systems—abused trusted tools and unnoticed vulnerabilities—are causing privilege escalation, cryptomining infections, and broader erosion of access, data, and trust.
#cve
Information security
fromThe Hacker News
1 month ago

Exposure Assessment Platforms Signal a Shift in Focus

Exposure Assessment Platforms replace traditional Vulnerability Management by providing continuous, risk‑prioritized, cross‑layer visibility to reduce alert fatigue and address “dead‑end” exposures.
Software development
fromInfoQ
1 month ago

GitLab 18.8 Marks General Availability of the Duo Agent Platform

GitLab Duo Agent Platform reaches general availability, orchestrating AI agents across the development lifecycle to automate planning, security, workflows, and vulnerability management.
Information security
fromTechzine Global
1 month ago

From vulnerability whack-a-mole to strategic risk operations

Shift security from counting vulnerabilities to strategic risk operations that prioritize exposure, value at risk, and measurable business outcomes.
fromAzure DevOps Blog
2 months ago

Work item linking for Advanced Security alerts now available - Azure DevOps Blog

Security vulnerabilities don't fix themselves. Someone needs to track them, prioritize them, and actually ship the fix. If you've ever tried to manage security alerts alongside your regular sprint work, though, you know the friction: you're looking at an alert in one tab, switching to your backlog in another, trying to remember which vulnerability you were supposed to file a bug for.
Information security
Information security
fromThe Hacker News
3 months ago

SecAlerts Cuts Through the Noise with a Smarter, Faster Way to Track Vulnerabilities

SecAlerts provides fast, affordable, non-invasive cloud-based vulnerability alerts matched to listed software, reducing noise and prioritizing actionable risks.
Information security
fromComputerworld
3 months ago

Why security needs a step change to thwart cyber attacks amid surging innovation

Enterprises must implement comprehensive vulnerability management—including automated scanning, prompt patching, and scalable penetration testing—to prevent preventable breaches and reduce attack surfaces from AI adoption.
fromNew Relic
3 months ago

How to Keep a Secure Environment with New Relic: Your Observability Shield

However, this change has come with some difficulties, since all our business information is stored online there has also been a spike in criminals who want to get profit out of stealing said information or preventing business operations. Just in 2024, the FBI has reported over $16.6 billion in losses related to cybercrime, and this value is only increasing year over year making that an "observable" environment must also be a "secure" one.
Information security
Information security
fromThe Hacker News
3 months ago

When Attacks Come Faster Than Patches: Why 2026 Will be the Year of Machine-Speed Security

Newly disclosed vulnerabilities are frequently weaponized within 48 hours, forcing defenders to outpace automated, AI-enhanced attacker workflows and abandon slow patch cadences.
Information security
fromThe Hacker News
4 months ago

Bridging the Remediation Gap: Introducing Pentera Resolve

Operational gaps, not visibility, prevent timely remediation of vulnerabilities detected across fragmented security tools; continuous, validated, and automated remediation workflows are required.
Venture
fromSecurityWeek
5 months ago

Mondoo Raises $17.5 Million for Vulnerability Management Platform

Mondoo raised $17.5 million in a Series A extension to expand its agentic vulnerability management platform and grow US and EMEA operations.
Information security
fromComputerworld
5 months ago

Why IT/Security alignment is the key to efficient operations

Misalignment between IT and security—driven by differing mandates and siloed data—creates unpatched vulnerabilities, delayed incident response, and increased operational and regulatory risk.
fromSecurityWeek
5 months ago

Virtual Event Today: Attack Surface Management Summit

SecurityWeek's Attack Surface Management Virtual Summit is now LIVE and runs today from 11AM - 4PM ET. Join the online event where cybersecurity leaders and practitioners will dive into the strategies, tools, and innovations shaping the future of ASM. As digital assets and cloud services continue to expand, defenders are shifting tactics to continuously discover, inventory, classify, prioritize, and monitor their attack surfaces.
Information security
Information security
fromSecuritymagazine
6 months ago

Why It's Time to Shift to Preemptive Exposure Management

Organizations must adopt preemptive, automated exposure management using AI and behavioral analytics because patching alone cannot stop rapidly increasing vulnerability exploitation.
#pentesting
Information security
fromBusiness Matters
6 months ago

Cyber attack whack-a-mole dynamics call for strategic exposure management

Prioritize continuous threat exposure management (CTEM) to proactively discover, prioritize, and mitigate cyber risks in an AI-driven, constantly evolving threat landscape.
Information security
fromSecuritymagazine
6 months ago

Jennifer Swann - Great Leaders Don't Just Manage Teams - They Build Them

Jennifer Swann progressed from bank teller to director-level information security, focusing on incident response, team building, and broad security programs including cloud and vulnerability management.
fromThe Hacker News
6 months ago

Webinar: Why Top Teams Are Prioritizing Code-to-Cloud Mapping in Our 2025 AppSec

But hidden in there is a tiny flaw that explodes into a huge problem once it hits the cloud. Next thing you know, hackers are in, and your company is dealing with a mess that costs millions. Scary, right? In 2025, the average data breach hits businesses with a whopping $4.44 million bill globally. And guess what? A big chunk of these headaches comes from app security slip-ups, like web attacks that snag credentials and wreak havoc.
Information security
#cloud-security
fromSilicon Canals
9 months ago
Artificial intelligence

London-based Maze secures 22.5M to beat hackers at their own game through an AI agent - Silicon Canals

fromSilicon Canals
9 months ago
Artificial intelligence

London-based Maze secures 22.5M to beat hackers at their own game through an AI agent - Silicon Canals

Apple
fromComputerworld
7 months ago

Kandji helps secure Apple enterprise with Vulnerability Response

Kandji's tool detects and manages vulnerabilities in Mac apps based on CVE data.
Web development
fromMedium
7 months ago

How to Implement Robust WAF Protection for Web Applications: Block SQL Injection, XSS, and DDoS...

Web Application Firewalls (WAFs) protect web applications from threats like SQL injection and Cross-Site Scripting (XSS).
Privacy professionals
fromDevOps.com
8 months ago

Still Running Vulnerable Log4j Instances? - DevOps.com

Log4j vulnerabilities remain a significant risk for organizations due to visibility and dependency issues.
Continuous monitoring and software composition analysis are essential for security.
Information security
fromTheregister
8 months ago

Nearly half of ransomware victims still pay out, says Sophos

Nearly half of ransomware victims still pay the ransom despite advice against it, but average payments are decreasing.
Organizations are becoming better at minimizing ransomware impacts, negotiating lower ransom amounts.
fromThe Hacker News
9 months ago

Pen Testing for Compliance Only? It's Time to Change Your Approach

Compliance-driven penetration testing can leave organizations vulnerable because it typically only covers compliance-relevant vulnerabilities, neglecting deeper security issues that may exist.
Information security
fromThe Hacker News
10 months ago

How to Automate CVE and Vulnerability Advisory Response with Tines

Before automation, creating tickets for 45 vulnerabilities took about 150 minutes of work. After automation, the time needed for the same number of tickets dropped to around 60 minutes.
DevOps
Information security
fromThe Hacker News
10 months ago

New Research Reveals: 95% of AppSec Fixes Don't Reduce Risk

Most application security alerts are unnecessary, causing more harm than good for organizations.
Application security has become inefficient, with teams overwhelmed by irrelevant alerts.
Improving application security requires a shift from mere detection to meaningful context.
#devsecops
#cve-foundation
fromTheregister
10 months ago

Homeland Security funding for CVE program expires

The 25-year-old CVE program is vital for vulnerability management, overseeing the organization and assignment of CVE IDs for specific security flaws to ensure clarity in communication.
Information security
[ Load more ]