Information security
fromZDNET
1 day agoChainguard is racing to fix trust in AI-built software - here's how
Chainguard introduces AI-powered Factory 2.0 to enhance programming security and automate vulnerability management.
TruRisk is designed to aggregate vulnerability data at the asset level and convert it into a measurable, business-aligned cyber risk score. Rather than evaluating vulnerabilities in isolation, TruRisk calculates a consolidated risk value per asset by helping security teams understand which systems pose the greatest operational and strategic risk.
This month, over half (55%) of all Patch Tuesday CVEs were privilege escalation bugs, and of those, six were rated exploitation more likely across Windows Graphics Component, Windows Accessibility Infrastructure, Windows Kernel, Windows SMB Server, and Winlogon. We know these bugs are typically used by threat actors as part of post-compromise activity, once they get onto systems through other means (social engineering, exploitation of another vulnerability).
The company rolled out fixes for 19 flaws in Adobe Commerce and Magento Open Source, urging users to apply the patches within the next 30 days, based on these products being a known target for threat actors. The update resolves six high-severity bugs, five of which could lead to privilege escalation: CVE-2026-21290, CVE-2026-21361, CVE-2026-21284, CVE-2026-21311, and CVE-2026-21309.
Security debt as 'known vulnerabilities left unresolved for more than a year' now affects 82 percent of companies, up from 74 percent a year ago. High-risk vulnerabilities, meaning flaws that are both severe and likely to be exploited, have risen from 8.3 percent to 11.3 percent.
Integrating security and asset data from over 200 connectors, the platform unifies business context and AI-based intelligence into a single pane, offering visibility and enabling risk prioritization and reduction. Nucleus relies on automation to enhance customers' vulnerability management programs. It correlates flaws with real-world threat data from multiple sources, normalizes it, maps assets to specific teams, and uses workflows for faster remediation. According to Nucleus, its vendor-agnostic approach covers exposure across tools, users, environments, and business units, unifies context, and enables coordinated action.
Security vulnerabilities don't fix themselves. Someone needs to track them, prioritize them, and actually ship the fix. If you've ever tried to manage security alerts alongside your regular sprint work, though, you know the friction: you're looking at an alert in one tab, switching to your backlog in another, trying to remember which vulnerability you were supposed to file a bug for.
However, this change has come with some difficulties, since all our business information is stored online there has also been a spike in criminals who want to get profit out of stealing said information or preventing business operations. Just in 2024, the FBI has reported over $16.6 billion in losses related to cybercrime, and this value is only increasing year over year making that an "observable" environment must also be a "secure" one.
SecurityWeek's Attack Surface Management Virtual Summit is now LIVE and runs today from 11AM - 4PM ET. Join the online event where cybersecurity leaders and practitioners will dive into the strategies, tools, and innovations shaping the future of ASM. As digital assets and cloud services continue to expand, defenders are shifting tactics to continuously discover, inventory, classify, prioritize, and monitor their attack surfaces.
But hidden in there is a tiny flaw that explodes into a huge problem once it hits the cloud. Next thing you know, hackers are in, and your company is dealing with a mess that costs millions. Scary, right? In 2025, the average data breach hits businesses with a whopping $4.44 million bill globally. And guess what? A big chunk of these headaches comes from app security slip-ups, like web attacks that snag credentials and wreak havoc.
Compliance-driven penetration testing can leave organizations vulnerable because it typically only covers compliance-relevant vulnerabilities, neglecting deeper security issues that may exist.