NIST’s shift toward selective CVE enrichment creates significant visibility gaps for teams relying solely on the National Vulnerability Database. As AI accelerates vulnerability disclosure rates, ...
Volunteerism isn’t just an initiative to us, it’s foundational to who we are,” said Amanda Klinger, program manager and ...
Continuous Threat Exposure Management (CTEM) has moved well past buzzword status. We've talked about this before. It's true ...
Industry and ad hoc coalitions appear poised to help fill the gap created by NIST's decision to cut back on CVE data ...
The central fact is that ENISA became a CVE Numbering Authority in January 2024, allowing it to assign CVE identifiers and ...
The EU cybersecurity agency looks to become the third Top-Level Root CVE Numbering Authority, alongside CISA and MITRE ...
Microsoft has fixed 167 vulnerabilities in its April 2026 Patch Tuesday update, including an actively exploited SharePoint ...
Lindsey Cerkovnik, head of vulnerability management at CISA, said AI companies should play a bigger role in vulnerability ...
AttackIQ has released a new attack graph that emulates the behaviors of NightSpire Ransomware, a financially motivated ...
For more than two years, the database that the entire cybersecurity industry relies on to catalog software flaws has been falling behind. Now, with researchers demonstrating that hackers can silently ...
The European Union is stepping forward to reinforce what many experts describe as a bedrock cyber vulnerability tracking system, as questions linger over the long-term sustainability of the Common ...
The Army-led Joint Interagency Task Force 401 has made one of its first major steps to securing interoperable counter-unmanned systems: selecting Anduril’s Lattice command-and-control software as a ...