#vulnerability-management

[ follow ]
Information security
fromThe Hacker News
4 hours ago

SecAlerts Cuts Through the Noise with a Smarter, Faster Way to Track Vulnerabilities

SecAlerts provides fast, affordable, non-invasive cloud-based vulnerability alerts matched to listed software, reducing noise and prioritizing actionable risks.
Information security
fromComputerworld
1 day ago

Why security needs a step change to thwart cyber attacks amid surging innovation

Enterprises must implement comprehensive vulnerability management—including automated scanning, prompt patching, and scalable penetration testing—to prevent preventable breaches and reduce attack surfaces from AI adoption.
fromNew Relic
1 week ago

How to Keep a Secure Environment with New Relic: Your Observability Shield

However, this change has come with some difficulties, since all our business information is stored online there has also been a spike in criminals who want to get profit out of stealing said information or preventing business operations. Just in 2024, the FBI has reported over $16.6 billion in losses related to cybercrime, and this value is only increasing year over year making that an "observable" environment must also be a "secure" one.
Information security
Information security
fromTechCrunch
2 weeks ago

CISA warns federal agencies to patch flawed Cisco firewalls amid 'active exploitation' across the US government | TechCrunch

Federal agencies are failing to patch Cisco ASA firewalls, leaving systems vulnerable to active exploitation by an advanced threat actor.
Information security
fromThe Hacker News
2 weeks ago

When Attacks Come Faster Than Patches: Why 2026 Will be the Year of Machine-Speed Security

Newly disclosed vulnerabilities are frequently weaponized within 48 hours, forcing defenders to outpace automated, AI-enhanced attacker workflows and abandon slow patch cadences.
#cybersecurity
Information security
fromThe Hacker News
1 month ago

Bridging the Remediation Gap: Introducing Pentera Resolve

Operational gaps, not visibility, prevent timely remediation of vulnerabilities detected across fragmented security tools; continuous, validated, and automated remediation workflows are required.
#cve
Venture
fromSecurityWeek
2 months ago

Mondoo Raises $17.5 Million for Vulnerability Management Platform

Mondoo raised $17.5 million in a Series A extension to expand its agentic vulnerability management platform and grow US and EMEA operations.
Information security
fromComputerworld
2 months ago

Why IT/Security alignment is the key to efficient operations

Misalignment between IT and security—driven by differing mandates and siloed data—creates unpatched vulnerabilities, delayed incident response, and increased operational and regulatory risk.
fromSecurityWeek
2 months ago

Virtual Event Today: Attack Surface Management Summit

SecurityWeek's Attack Surface Management Virtual Summit is now LIVE and runs today from 11AM - 4PM ET. Join the online event where cybersecurity leaders and practitioners will dive into the strategies, tools, and innovations shaping the future of ASM. As digital assets and cloud services continue to expand, defenders are shifting tactics to continuously discover, inventory, classify, prioritize, and monitor their attack surfaces.
Information security
Information security
fromSecuritymagazine
2 months ago

Why It's Time to Shift to Preemptive Exposure Management

Organizations must adopt preemptive, automated exposure management using AI and behavioral analytics because patching alone cannot stop rapidly increasing vulnerability exploitation.
Information security
fromSecuritymagazine
2 months ago

WhatsApp Flaw Added to CISA's Known Exploited Vulnerabilities Catalog

CISA added two actively exploited vulnerabilities—TP-Link TL-WA855RE missing authentication (CVE-2020-24363) and WhatsApp incorrect authorization (CVE-2025-55177)—to the KEV Catalog.
#pentesting
Information security
fromBusiness Matters
2 months ago

Cyber attack whack-a-mole dynamics call for strategic exposure management

Prioritize continuous threat exposure management (CTEM) to proactively discover, prioritize, and mitigate cyber risks in an AI-driven, constantly evolving threat landscape.
Information security
fromSecuritymagazine
3 months ago

Jennifer Swann - Great Leaders Don't Just Manage Teams - They Build Them

Jennifer Swann progressed from bank teller to director-level information security, focusing on incident response, team building, and broad security programs including cloud and vulnerability management.
fromThe Hacker News
3 months ago

Webinar: Why Top Teams Are Prioritizing Code-to-Cloud Mapping in Our 2025 AppSec

But hidden in there is a tiny flaw that explodes into a huge problem once it hits the cloud. Next thing you know, hackers are in, and your company is dealing with a mess that costs millions. Scary, right? In 2025, the average data breach hits businesses with a whopping $4.44 million bill globally. And guess what? A big chunk of these headaches comes from app security slip-ups, like web attacks that snag credentials and wreak havoc.
Information security
#cloud-security
fromSilicon Canals
5 months ago
Artificial intelligence

London-based Maze secures 22.5M to beat hackers at their own game through an AI agent - Silicon Canals

fromSilicon Canals
5 months ago
Artificial intelligence

London-based Maze secures 22.5M to beat hackers at their own game through an AI agent - Silicon Canals

Apple
fromComputerworld
4 months ago

Kandji helps secure Apple enterprise with Vulnerability Response

Kandji's tool detects and manages vulnerabilities in Mac apps based on CVE data.
Web development
fromMedium
4 months ago

How to Implement Robust WAF Protection for Web Applications: Block SQL Injection, XSS, and DDoS...

Web Application Firewalls (WAFs) protect web applications from threats like SQL injection and Cross-Site Scripting (XSS).
Privacy professionals
fromDevOps.com
5 months ago

Still Running Vulnerable Log4j Instances? - DevOps.com

Log4j vulnerabilities remain a significant risk for organizations due to visibility and dependency issues.
Continuous monitoring and software composition analysis are essential for security.
Information security
fromTheregister
5 months ago

Nearly half of ransomware victims still pay out, says Sophos

Nearly half of ransomware victims still pay the ransom despite advice against it, but average payments are decreasing.
Organizations are becoming better at minimizing ransomware impacts, negotiating lower ransom amounts.
fromThe Hacker News
6 months ago

Pen Testing for Compliance Only? It's Time to Change Your Approach

Compliance-driven penetration testing can leave organizations vulnerable because it typically only covers compliance-relevant vulnerabilities, neglecting deeper security issues that may exist.
Information security
fromThe Hacker News
7 months ago

How to Automate CVE and Vulnerability Advisory Response with Tines

Before automation, creating tickets for 45 vulnerabilities took about 150 minutes of work. After automation, the time needed for the same number of tickets dropped to around 60 minutes.
DevOps
Information security
fromThe Hacker News
7 months ago

New Research Reveals: 95% of AppSec Fixes Don't Reduce Risk

Most application security alerts are unnecessary, causing more harm than good for organizations.
Application security has become inefficient, with teams overwhelmed by irrelevant alerts.
Improving application security requires a shift from mere detection to meaningful context.
#devsecops
#cve-foundation
[ Load more ]