Google Threat Intelligence Group (GTIG) tracked 90 zero-day vulnerabilities actively exploited throughout 2025, almost half of them in enterprise software and appliances.
A maximum severity vulnerability in the FreeScout helpdesk platform allows hackers to achieve remote code execution without any user interaction or authentication.
This high-severity Chrome Gemini vulnerability lets malicious extensions spy on your PC ...
The European Union Agency for Cybersecurity (Enisa) has debuted a European Union Vulnerability Database (EUVD) to provide “aggregated, reliable and actionable” information on newly disclosed cyber ...
Time and again, dangerous security vulnerabilities are discovered in the hardware of certain manufacturers. Lenovo AIO PCs landed in the news as recently as last week, and now Dell laptop owners need ...
1. Use anti-virus software and keep it up to date. Make sure you have anti-virus software on your computer. With new viruses emerging daily, anti-virus programs need regular updates, like annual flu ...
The UK’s National Cyber Security Centre (NCSC) has lifted the lid on a Vulnerability Research Initiative (VRI) programme designed to engage the private sector on vulnerability research and discovery ...
Many organizations prioritize compliance, assuming it ensures security—but does it, actually? Vulnerability management should come first, as security is about proactively identifying and mitigating ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results