#vulnerability-management

[ follow ]
Information security
fromSecurityWeek
3 days ago

Cogent Security Raises $42 Million for AI-Driven Vulnerability Management

Cogent Security raised $42M Series A to build autonomous AI agents that automate vulnerability investigation, prioritization, and remediation across environments.
fromSecurityWeek
1 week ago

Nucleus Raises $20 Million for Exposure Management

Integrating security and asset data from over 200 connectors, the platform unifies business context and AI-based intelligence into a single pane, offering visibility and enabling risk prioritization and reduction. Nucleus relies on automation to enhance customers' vulnerability management programs. It correlates flaws with real-world threat data from multiple sources, normalizes it, maps assets to specific teams, and uses workflows for faster remediation. According to Nucleus, its vendor-agnostic approach covers exposure across tools, users, environments, and business units, unifies context, and enables coordinated action.
Venture
Information security
fromComputerWeekly.com
1 week ago

CVE volumes may plausibly reach 100,000 this year | Computer Weekly

Disclosed CVEs may exceed 50,000 in 2026, with realistic scenarios reaching 70,000–100,000 and an urgent need to scale and prioritise vulnerability response.
#cisa-kev
fromSecurityWeek
1 week ago
Information security

New Paper and Tool Help Security Teams Move Beyond Blind Reliance on CISA's KEV Catalog

fromSecurityWeek
1 week ago
Information security

New Paper and Tool Help Security Teams Move Beyond Blind Reliance on CISA's KEV Catalog

#cisa
fromTechCrunch
3 months ago
Information security

CISA warns federal agencies to patch flawed Cisco firewalls amid 'active exploitation' across the US government | TechCrunch

fromTechCrunch
3 months ago
Information security

CISA warns federal agencies to patch flawed Cisco firewalls amid 'active exploitation' across the US government | TechCrunch

#cybersecurity
fromFortune
1 month ago
Information security

Invictus-backed cybersecurity company ThreatModeler acquires competitor IriusRisk for over $100 million | Fortune

Information security
fromTheregister
3 months ago

Ex-CISA chief says AI could mean the end of cybersecurity

AI accelerates both attacker capabilities and vulnerability discovery; secure-by-design software and strong AI governance could make breaches rare anomalies rather than routine costs.
fromFortune
1 month ago
Information security

Invictus-backed cybersecurity company ThreatModeler acquires competitor IriusRisk for over $100 million | Fortune

#software-supply-chain
fromSecurityWeek
2 weeks ago
Information security

RapidFort Raises $42M to Automate Software Supply Chain Security

RapidFort raised $42 million to scale an automated platform that eliminates vulnerabilities by analyzing, hardening containers, supplying curated near-zero-CVE images, and reducing runtime attack surface.
fromTechzine Global
9 months ago
Software development

Dropping the SBOM, why software supply chains are too flaky

The importance of managing software supply chain security is rising due to increased vulnerabilities and the prevalence of open-source software.
#ai-security
Information security
fromThe Hacker News
3 weeks ago

ThreatsDay Bulletin: New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

Small, quiet shifts across systems—abused trusted tools and unnoticed vulnerabilities—are causing privilege escalation, cryptomining infections, and broader erosion of access, data, and trust.
#cve
Information security
fromThe Hacker News
1 month ago

Exposure Assessment Platforms Signal a Shift in Focus

Exposure Assessment Platforms replace traditional Vulnerability Management by providing continuous, risk‑prioritized, cross‑layer visibility to reduce alert fatigue and address “dead‑end” exposures.
Software development
fromInfoQ
1 month ago

GitLab 18.8 Marks General Availability of the Duo Agent Platform

GitLab Duo Agent Platform reaches general availability, orchestrating AI agents across the development lifecycle to automate planning, security, workflows, and vulnerability management.
Information security
fromTechzine Global
1 month ago

From vulnerability whack-a-mole to strategic risk operations

Shift security from counting vulnerabilities to strategic risk operations that prioritize exposure, value at risk, and measurable business outcomes.
fromAzure DevOps Blog
2 months ago

Work item linking for Advanced Security alerts now available - Azure DevOps Blog

Security vulnerabilities don't fix themselves. Someone needs to track them, prioritize them, and actually ship the fix. If you've ever tried to manage security alerts alongside your regular sprint work, though, you know the friction: you're looking at an alert in one tab, switching to your backlog in another, trying to remember which vulnerability you were supposed to file a bug for.
Information security
Information security
fromThe Hacker News
2 months ago

SecAlerts Cuts Through the Noise with a Smarter, Faster Way to Track Vulnerabilities

SecAlerts provides fast, affordable, non-invasive cloud-based vulnerability alerts matched to listed software, reducing noise and prioritizing actionable risks.
Information security
fromComputerworld
2 months ago

Why security needs a step change to thwart cyber attacks amid surging innovation

Enterprises must implement comprehensive vulnerability management—including automated scanning, prompt patching, and scalable penetration testing—to prevent preventable breaches and reduce attack surfaces from AI adoption.
fromNew Relic
3 months ago

How to Keep a Secure Environment with New Relic: Your Observability Shield

However, this change has come with some difficulties, since all our business information is stored online there has also been a spike in criminals who want to get profit out of stealing said information or preventing business operations. Just in 2024, the FBI has reported over $16.6 billion in losses related to cybercrime, and this value is only increasing year over year making that an "observable" environment must also be a "secure" one.
Information security
Information security
fromThe Hacker News
3 months ago

When Attacks Come Faster Than Patches: Why 2026 Will be the Year of Machine-Speed Security

Newly disclosed vulnerabilities are frequently weaponized within 48 hours, forcing defenders to outpace automated, AI-enhanced attacker workflows and abandon slow patch cadences.
Information security
fromThe Hacker News
4 months ago

Bridging the Remediation Gap: Introducing Pentera Resolve

Operational gaps, not visibility, prevent timely remediation of vulnerabilities detected across fragmented security tools; continuous, validated, and automated remediation workflows are required.
Venture
fromSecurityWeek
4 months ago

Mondoo Raises $17.5 Million for Vulnerability Management Platform

Mondoo raised $17.5 million in a Series A extension to expand its agentic vulnerability management platform and grow US and EMEA operations.
Information security
fromComputerworld
5 months ago

Why IT/Security alignment is the key to efficient operations

Misalignment between IT and security—driven by differing mandates and siloed data—creates unpatched vulnerabilities, delayed incident response, and increased operational and regulatory risk.
fromSecurityWeek
5 months ago

Virtual Event Today: Attack Surface Management Summit

SecurityWeek's Attack Surface Management Virtual Summit is now LIVE and runs today from 11AM - 4PM ET. Join the online event where cybersecurity leaders and practitioners will dive into the strategies, tools, and innovations shaping the future of ASM. As digital assets and cloud services continue to expand, defenders are shifting tactics to continuously discover, inventory, classify, prioritize, and monitor their attack surfaces.
Information security
Information security
fromSecuritymagazine
5 months ago

Why It's Time to Shift to Preemptive Exposure Management

Organizations must adopt preemptive, automated exposure management using AI and behavioral analytics because patching alone cannot stop rapidly increasing vulnerability exploitation.
#pentesting
Information security
fromBusiness Matters
5 months ago

Cyber attack whack-a-mole dynamics call for strategic exposure management

Prioritize continuous threat exposure management (CTEM) to proactively discover, prioritize, and mitigate cyber risks in an AI-driven, constantly evolving threat landscape.
Information security
fromSecuritymagazine
5 months ago

Jennifer Swann - Great Leaders Don't Just Manage Teams - They Build Them

Jennifer Swann progressed from bank teller to director-level information security, focusing on incident response, team building, and broad security programs including cloud and vulnerability management.
fromThe Hacker News
5 months ago

Webinar: Why Top Teams Are Prioritizing Code-to-Cloud Mapping in Our 2025 AppSec

But hidden in there is a tiny flaw that explodes into a huge problem once it hits the cloud. Next thing you know, hackers are in, and your company is dealing with a mess that costs millions. Scary, right? In 2025, the average data breach hits businesses with a whopping $4.44 million bill globally. And guess what? A big chunk of these headaches comes from app security slip-ups, like web attacks that snag credentials and wreak havoc.
Information security
#cloud-security
fromTechzine Global
6 months ago
Privacy technologies

Upwind drafts in Nyx for cloud security keyhole surgery

Upwind's acquisition of Nyx enhances application security through function-level runtime visibility for real-time threat detection and vulnerability prioritization.
fromSilicon Canals
8 months ago
Artificial intelligence

London-based Maze secures 22.5M to beat hackers at their own game through an AI agent - Silicon Canals

Maze has raised $25M in Series A funding to enhance its AI-native cloud security platform for vulnerability investigation and resolution.
fromSilicon Canals
8 months ago
Artificial intelligence

London-based Maze secures 22.5M to beat hackers at their own game through an AI agent - Silicon Canals

Apple
fromComputerworld
7 months ago

Kandji helps secure Apple enterprise with Vulnerability Response

Kandji's tool detects and manages vulnerabilities in Mac apps based on CVE data.
Web development
fromMedium
7 months ago

How to Implement Robust WAF Protection for Web Applications: Block SQL Injection, XSS, and DDoS...

Web Application Firewalls (WAFs) protect web applications from threats like SQL injection and Cross-Site Scripting (XSS).
Privacy professionals
fromDevOps.com
7 months ago

Still Running Vulnerable Log4j Instances? - DevOps.com

Log4j vulnerabilities remain a significant risk for organizations due to visibility and dependency issues.
Continuous monitoring and software composition analysis are essential for security.
Information security
fromTheregister
7 months ago

Nearly half of ransomware victims still pay out, says Sophos

Nearly half of ransomware victims still pay the ransom despite advice against it, but average payments are decreasing.
Organizations are becoming better at minimizing ransomware impacts, negotiating lower ransom amounts.
fromThe Hacker News
9 months ago

Pen Testing for Compliance Only? It's Time to Change Your Approach

Compliance-driven penetration testing can leave organizations vulnerable because it typically only covers compliance-relevant vulnerabilities, neglecting deeper security issues that may exist.
Information security
fromThe Hacker News
9 months ago

How to Automate CVE and Vulnerability Advisory Response with Tines

Before automation, creating tickets for 45 vulnerabilities took about 150 minutes of work. After automation, the time needed for the same number of tickets dropped to around 60 minutes.
DevOps
Information security
fromThe Hacker News
9 months ago

New Research Reveals: 95% of AppSec Fixes Don't Reduce Risk

Most application security alerts are unnecessary, causing more harm than good for organizations.
Application security has become inefficient, with teams overwhelmed by irrelevant alerts.
Improving application security requires a shift from mere detection to meaningful context.
#devsecops
#cve-foundation
[ Load more ]