Common Vulnerabilities and Exposures (CVE) stories
Critical Microsoft vulnerabilities double in yearly report
Last week
#
pam
#
cloud security
#
iam
Critical Microsoft flaws double as Azure and Dynamics 365 risks surge, BeyondTrust warns organisations to prioritise identity and privilege controls.
FIRST conference highlights AI & CVE disclosure push
This month
#
iot security
#
application security
#
supply chain
FIRST conference in Scottsdale draws 500-plus as security leaders and AI firms debate vulnerability disclosure, CWE's role and CVE's future.
Splashtop launches unified IT platform for endpoints
This month
#
endpoint protection
#
digital transformation
#
it automation
Splashtop bets on AI-assisted patching and security alerts in a single console as it targets lean IT teams and MSPs with a new endpoint platform.
Forrester says Anthropic AI could break patch playbook
This month
#
hybrid cloud
#
digital transformation
#
application security
Forrester warns Anthropic's Project Glasswing could overwhelm vulnerability management, as AI uncovers flaws faster than patching teams can respond.
Intruder adds container image scanning to cloud platform
This month
#
virtualisation
#
devops
#
hybrid cloud
Intruder expands cloud security platform with registry-level container image scanning for AWS, Google Cloud and Azure users.
2N urges tougher cyber rules for access control devices
This month
#
edutech
#
data protection
#
hyperscale
2N calls for tougher cyber rules on access control, urging stronger vulnerability reporting, tighter component sourcing and longer support lifecycles.
Qualys warns attackers exploit flaws before disclosure
This month
#
firewalls
#
vpns
#
network security
Qualys says attackers are exploiting flaws before disclosure as remediation backlogs swell, with edge devices facing the highest risk.
Percona & Chainguard launch supported database images
Last month
#
virtualisation
#
devops
#
digital transformation
Percona teams up with Chainguard to offer supported, hardened container images for MySQL, PostgreSQL and MongoDB databases.
Rapid7 warns exploited software flaws more than double
Last month
#
firewalls
#
ransomware
#
network security
Rapid7 warns exploited high and critical software flaws more than doubled in 2025, as attackers compress disclosure-to-attack windows.
FIRST announces 2026 cyber security conference trio
Last month
#
application security
#
advanced persistent threat protection
#
socs
FIRST to host three cybersecurity conferences in 2026 as it predicts annual CVE disclosures will surpass 50,000 for the first time.
GitHub backs Alpha-Omega with fresh open source funds
Last month
#
siem
#
hyperscale
#
application security
GitHub joins tech giants in a USD $12.5 million Alpha-Omega push, boosting AI-powered defences for critical open source software.
Microsoft patches major SQL Server flaw in March update
Last month
#
firewalls
#
network security
#
mfa
Microsoft's March Patch Tuesday fixes 77 flaws, including a severe SQL Server bug that could grant attackers sysadmin rights remotely.
Wireless CVEs surge, exposing hidden risks for AI centres
Last month
#
uc
#
firewalls
#
surveillance
Wireless flaws have surged 230-fold since 2010, as Bastille warns AI data centres and critical infrastructure face escalating unseen risks.
Exclusive: Cyber threats escalate as Australian organisations face sophisticated attacks
Thu, 6th Mar 2025
#
ransomware
#
crypto
#
blockchain
Australian organisations face escalating cyber threats as ransomware groups adopt advanced tactics previously seen only in state-sponsored attacks.
BackBox celebrates record growth & innovation in 2023
Fri, 26th Jan 2024
#
network infrastructure
#
risk & compliance
#
cloud services
BackBox, a network team automation firm, reported stellar growth in 2023, showcasing strong expansion and significant growth in clientele.
Sophos highlights dangers of remote desktop protocol attacks
Wed, 24th Jul 2019
#
firewalls
#
network infrastructure
#
network security
Sophos research reveals that remote desktop protocol (RDP) is the preferred method of attack for cybercriminals targeting vulnerable devices.