#vulnerability-management

[ follow ]
Information security
fromtheregister
39 minutes ago

Bug hunter tracks down three massive MCP flaws and one vendor won't fix theirs

Missing or faulty security validation in MCP servers enables SQL injection, metadata exfiltration, and potential takeover of internet-exposed database instances.
#ai-cybersecurity
SF politics
fromNextgov.com
2 hours ago

'No time to waste' in prepping governments for AI cyber threats, top Dem lawmaker says

DHS should coordinate with SLTT governments and the private sector to prepare for AI-driven cyber threats and protect critical infrastructure.
London startup
fromTNW | Security
4 days ago

Intruder launches AI pentesting agents as GCHQ-backed startup automates $50K manual security tests

AI pentesting agents replicate human methodology to validate scanner findings and deliver vulnerability results in minutes at far lower cost than manual testing.
SF politics
fromNextgov.com
2 hours ago

'No time to waste' in prepping governments for AI cyber threats, top Dem lawmaker says

DHS should coordinate with SLTT governments and the private sector to prepare for AI-driven cyber threats and protect critical infrastructure.
London startup
fromTNW | Security
4 days ago

Intruder launches AI pentesting agents as GCHQ-backed startup automates $50K manual security tests

AI pentesting agents replicate human methodology to validate scanner findings and deliver vulnerability results in minutes at far lower cost than manual testing.
Information security
fromSecurityWeek
6 hours ago

Sweet Security Launches Agentic AI Red Teaming to Counter 'Mythos Moment'

Human security cannot match AI-assisted cyberattack speed and volume, requiring security programs that use environment-specific AI agents and continuous red teaming.
Information security
fromSecurityWeek
12 hours ago

Chipmaker Patch Tuesday: Intel and AMD Patch 70 Vulnerabilities

Intel and AMD released May 2026 Patch Tuesday advisories covering 70 vulnerabilities, including critical flaws enabling privilege escalation and potential code execution.
#microsoft-patch-tuesday
Information security
fromtheregister
21 hours ago

Doozy of a Patch Tuesday includes 30 critical Microsoft CVEs

Microsoft released fixes for 137 CVEs, including 30 critical flaws, with AI-driven bug hunting (MDASH) identifying 16 vulnerabilities.
Information security
fromTechzine Global
13 hours ago

Microsoft patches 137 vulnerabilities and deploys AI scanner

Microsoft’s May Patch Tuesday fixes 137 vulnerabilities, including 30 critical, with AI-driven detection and an internal MDASH scanning environment accelerating discovery and patching.
Information security
fromtheregister
21 hours ago

Doozy of a Patch Tuesday includes 30 critical Microsoft CVEs

Microsoft released fixes for 137 CVEs, including 30 critical flaws, with AI-driven bug hunting (MDASH) identifying 16 vulnerabilities.
Information security
fromComputerWeekly.com
22 hours ago

Microsoft releases rare zero-day free Patch Tuesday update | Computer Weekly

May 2026 Patch Tuesday fixes about 140 CVEs with no zero-days, but nearly 20 critical flaws require rapid patching and Secure Boot certificate rotation by 26 June.
Information security
fromDevOps.com
1 day ago

OpenAI's Daybreak Challenges Anthropic in AI Cybersecurity Race

Daybreak embeds AI-driven vulnerability identification, fix validation, and faster patching into enterprise software development workflows using Codex Security and vendor integrations.
#cybersecurity
fromEngadget
1 day ago
Information security

Daybreak is OpenAI's response to Anthropic's Claude Mythos - Engadget

fromDevOps.com
1 week ago
Software development

Anthropic Brings AI-Powered Security Scanning to Enterprise Teams With Claude Security - DevOps.com

Information security
fromComputerworld
1 day ago

OpenAI introduces Daybreak cyber platform, takes on Anthropic Mythos

Daybreak automates vulnerability detection, patch testing, and audit-ready verification to continuously secure software across enterprise development lifecycles.
Information security
fromThe Hacker News
1 day ago

OpenAI Launches Daybreak for AI-Powered Vulnerability Detection and Patch Validation

Daybreak combines OpenAI frontier AI with Codex Security to help organizations find and patch vulnerabilities before attackers exploit them.
Information security
fromEngadget
1 day ago

Daybreak is OpenAI's response to Anthropic's Claude Mythos - Engadget

Daybreak applies OpenAI AI models to embed cybersecurity into software, prioritizing high-impact issues, accelerating patch creation, and returning audit-ready evidence to clients.
Information security
fromSecuritymagazine
1 week ago

Security Experts Discuss Proposed Government Patching Deadlines

U.S. cyber officials propose reducing vulnerability patching timelines from weeks to three days due to accelerated cyber threats from AI advancements.
Information security
fromTheregister
1 week ago

India orders infosec red alert in case Mythos sparks crime

India's Securities and Exchange Board urges immediate review of information security systems due to potential risks from AI-driven vulnerability identification tools.
Software development
fromDevOps.com
1 week ago

Anthropic Brings AI-Powered Security Scanning to Enterprise Teams With Claude Security - DevOps.com

Claude Security enables security teams to scan codebases for vulnerabilities and generate patches efficiently, enhancing remediation processes.
#application-security
Information security
fromZDNET
2 days ago

The patching treadmill: Why traditional application security is no longer enough

Continuous deployment and scanning create endless find-and-fix cycles, overwhelming teams and making old security models obsolete.
fromTechzine Global
1 month ago
Software development

Checkmarx Focuses AppSec on AI Development

Checkmarx One integrates AI-driven security with autonomous agents to continuously monitor code throughout development, shifting security from a separate step to an embedded process that addresses vulnerabilities earlier in the cycle.
Information security
fromZDNET
2 days ago

The patching treadmill: Why traditional application security is no longer enough

Continuous deployment and scanning create endless find-and-fix cycles, overwhelming teams and making old security models obsolete.
Software development
fromTechzine Global
1 month ago

Checkmarx Focuses AppSec on AI Development

Checkmarx One integrates AI-driven security with autonomous agents to continuously monitor code throughout development, shifting security from a separate step to an embedded process that addresses vulnerabilities earlier in the cycle.
Privacy professionals
fromtheregister
2 days ago

Water company's leaky security earns near-1M fine

Cl0p ransomware went undetected for nearly two years due to weak access controls, insufficient monitoring, unsupported systems, and poor vulnerability management.
Privacy professionals
fromSecurityWeek
2 days ago

Skoda Data Breach Hits Online Shop Customers

A Skoda online shop data breach exposed customer account and order information after a software vulnerability was exploited, prompting patching, investigation, and user guidance.
fromtheregister
2 days ago

Taiwan's train cyber-trauma reveals a global system that's coming off the tracks

There are three little words to make the heart beat faster in anyone who knows what they mean: critical infrastructure resilience. If you run that infrastructure or a country dependent on it, you need energy, communication and transport to be impregnable to cyber attacks. This is doubly so if that country is five minutes by incoming missile from an implacable hyper-competent enemy sworn to invade you.
Information security
fromThe Hacker News
4 days ago

cPanel, WHM Patch 3 New Vulnerabilities After Zero-Day Exploitation

cPanel has released updates to address three vulnerabilities in cPanel and Web Host Manager (WHM) that could be exploited to achieve privilege escalation, code execution, and denial-of-service. The list of vulnerabilities is as follows - CVE-2026-29201 (CVSS score: 4.3) - An insufficient input validation of the feature file name in the "feature::LOADFEATUREFILE" adminbin call that could result in an arbitrary file read. CVE-2026-29202 (CVSS score: 8.8) - An insufficient input validation of the "plugin" parameter in the "create_user API" call that could result in arbitrary Perl code execution on behalf of the already authenticated account's system user. CVE-2026-29203 (CVSS score: 8.8) - An unsafe symlink handling vulnerability that allows a user to modify access permissions of an arbitrary file using chmod, resulting in denial-of-service or possible privilege escalation.
Information security
Software development
fromDevOps.com
5 days ago

Vercel's deepsec Brings AI-Powered Security Scanning Into the Development Workflow - DevOps.com

Deepsec automates early, agent-driven security review by scanning, investigating, revalidating, enriching, and exporting findings from large codebases on your infrastructure.
Information security
fromSecurityWeek
5 days ago

In Other News: Train Hacker Arrested, PamDOORa Linux Backdoor, New CISA Director Frontrunner

Federal agencies are being pushed to patch critical vulnerabilities within three days due to faster AI-enabled exploitation.
DevOps
fromDevOps.com
5 days ago

Beyond the Build: Integrating Security into CI/CD Pipelines - DevOps.com

Embedding security checks into CI/CD pipelines through DevSecOps practices enables early vulnerability detection while maintaining development velocity.
Information security
fromThe Hacker News
6 days ago

ThreatsDay Bulletin: Edge Plaintext Passwords, ICS 0-Days, Patch-or-Die Alerts and 25+ New Stories

Basic attack methods like compromised packages, fake apps, and stolen credentials remain the most effective hacking techniques in 2026, while AI accelerates exploit discovery and defenders struggle to patch faster than attackers automate.
Information security
fromSecurityWeek
1 week ago

Oracle Debuts Monthly Critical Security Patch Updates

Oracle introduces monthly security updates to address critical vulnerabilities more quickly, enhancing customer protection and response times.
Information security
fromInfoQ
1 week ago

Cloudflare Processes 10M+ Daily Insights with New Security Overview Dashboard

Cloudflare's new Security Overview dashboard consolidates security signals into actionable insights, prioritizing vulnerabilities for efficient risk management.
#cisa
fromTechCrunch
5 months ago
Information security

CISA warns federal agencies to patch flawed Cisco firewalls amid 'active exploitation' across the US government | TechCrunch

fromTechCrunch
5 months ago
Information security

CISA warns federal agencies to patch flawed Cisco firewalls amid 'active exploitation' across the US government | TechCrunch

Software development
fromDevOps.com
2 weeks ago

A Day with Developer Assist: Faster Fixes, Cleaner Commits - DevOps.com

Security tools should enhance developer efficiency by providing contextual insights and guided remediation, rather than complicating the process.
#exposure-management
DevOps
fromThe Hacker News
2 weeks ago

What to Look for in an Exposure Management Platform (And What Most of Them Get Wrong)

Exposure management platforms vary in effectiveness, and security leaders need to evaluate them based on their ability to reduce actual risk.
fromSecurityWeek
2 months ago
Venture

Nucleus Raises $20 Million for Exposure Management

Nucleus Security raised $20 million in a Series C led by Delta-v Capital to scale its exposure management orchestration platform and automation across cloud and AI-driven environments.
DevOps
fromThe Hacker News
2 weeks ago

What to Look for in an Exposure Management Platform (And What Most of Them Get Wrong)

Exposure management platforms vary in effectiveness, and security leaders need to evaluate them based on their ability to reduce actual risk.
Software development
fromDevOps.com
2 weeks ago

The Code Doesn't Care Who Wrote It: Why Context, Not AI Fear, Will Define Modern Application Security - DevOps.com

AI is now integral to software development, enhancing productivity despite existing corporate policies that restrict its use.
Information security
fromThe Hacker News
2 weeks ago

Mythos Changed the Math on Vulnerability Discovery. Most Teams Aren't Ready for the Remediation Side

AI systems like Claude Mythos can identify vulnerabilities quickly, but organizations struggle to remediate them effectively.
Software development
fromDevOps.com
2 weeks ago

Agentic AI for Defense: How Checkmarx Turns Security into a Coding Partner - DevOps.com

Agentic AI proactively identifies and addresses security vulnerabilities in real-time during code development, enhancing application security significantly.
Information security
fromSecurityWeek
3 weeks ago

Are SBOMs Failing? Supply Chain Attacks Rise as Security Teams Struggle With SBOM Data

SBOMs and VEX statements fail to enhance software supply chain security due to poor decision-making and inconsistent interpretation of available data.
#ai-agents
fromInfoQ
3 months ago
Software development

GitLab 18.8 Marks General Availability of the Duo Agent Platform

GitLab Duo Agent Platform reaches general availability, orchestrating AI agents across the development lifecycle to automate planning, security, workflows, and vulnerability management.
fromInfoQ
3 months ago
Software development

GitLab 18.8 Marks General Availability of the Duo Agent Platform

#nist
Information security
fromSecurityWeek
3 weeks ago

NIST Prioritizes NVD Enrichment for CVEs in CISA KEV, Critical Software

NIST updates its National Vulnerability Database operations to prioritize enriching critical CVEs due to a surge in submissions.
Information security
fromSecurityWeek
3 weeks ago

NIST Prioritizes NVD Enrichment for CVEs in CISA KEV, Critical Software

NIST updates its National Vulnerability Database operations to prioritize enriching critical CVEs due to a surge in submissions.
#software-supply-chain
Information security
fromDevOps.com
3 weeks ago

The Open Source Trap: Why Trust Isn't a Security Strategy - DevOps.com

The software supply chain is vulnerable due to reliance on under-resourced open source maintainers, requiring active organizational support for security.
Information security
fromDevOps.com
3 weeks ago

The Open Source Trap: Why Trust Isn't a Security Strategy - DevOps.com

The software supply chain is vulnerable due to reliance on under-resourced open source maintainers, requiring active organizational support for security.
Web frameworks
fromInfoQ
4 weeks ago

Empower Your Developers: How Open Source Dependencies Risk Management Can Unlock Innovation

Improving security in open-source dependencies is essential for effective risk management and innovation.
Information security
fromDevOps.com
1 month ago

Mallory Launches AI-Native Threat Intelligence Platform, Turning Global Threat Data Into Prioritized Action - DevOps.com

Mallory provides an AI-native threat intelligence platform that delivers actionable insights for enterprise security teams, focusing on real threats and vulnerabilities.
DevOps
fromComputerWeekly.com
1 month ago

How 'Wikipedia of cyber' helps SAP make sense of threat data | Computer Weekly

SAP faces significant challenges in securing enterprise data amidst a complex threat landscape and evolving compliance requirements.
DevOps
fromnews.bitcoin.com
1 month ago

Ripple Boosts XRP Security With AI-Driven Network Enhancements

Rising complexity in blockchain infrastructure necessitates stronger security measures, with Ripple implementing AI-driven safeguards for the XRP Ledger.
#ai-security
Information security
fromZDNET
1 month ago

Chainguard is racing to fix trust in AI-built software - here's how

Chainguard introduces AI-powered Factory 2.0 to enhance programming security and automate vulnerability management.
Information security
fromSecurityWeek
1 month ago

Critical ScreenConnect Vulnerability Exposes Machine Keys

ConnectWise released a security update for ScreenConnect addressing CVE-2026-3564, a critical vulnerability allowing attackers to access cryptographic machine keys by encrypting previously exposed cryptographic material in server configuration files.
Privacy professionals
fromSecurityWeek
1 month ago

Hacker Conversations: Ben Harris, from Unintentional Young Hacker to Intentional Adult CEO

Ben Harris evolved from a mischievous school hacker into a legitimate cybersecurity entrepreneur, founding WatchTowr to identify and validate exploitable vulnerabilities in real-time.
fromMedium
1 month ago

TruRisk : Qualys' Approach for Prioritizing Asset for Patch Management

TruRisk is designed to aggregate vulnerability data at the asset level and convert it into a measurable, business-aligned cyber risk score. Rather than evaluating vulnerabilities in isolation, TruRisk calculates a consolidated risk value per asset by helping security teams understand which systems pose the greatest operational and strategic risk.
Business intelligence
DevOps
fromTechzine Global
1 month ago

NinjaOne launches Vulnerability Management for detection and remediation

NinjaOne's Vulnerability Management solution enables real-time vulnerability detection and automated remediation integrated into a single workflow, eliminating delays from traditional periodic scanning approaches.
Information security
fromThe Hacker News
2 months ago

What Boards Must Demand in the Age of AI-Automated Exploitation

AI-powered exploitation has eliminated the time constraints that previously made large vulnerability backlogs survivable, forcing organizations to immediately address security gaps or face rapid compromise.
fromThe Hacker News
2 months ago

Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days

This month, over half (55%) of all Patch Tuesday CVEs were privilege escalation bugs, and of those, six were rated exploitation more likely across Windows Graphics Component, Windows Accessibility Infrastructure, Windows Kernel, Windows SMB Server, and Winlogon. We know these bugs are typically used by threat actors as part of post-compromise activity, once they get onto systems through other means (social engineering, exploitation of another vulnerability).
Information security
Information security
fromSecurityWeek
2 months ago

Microsoft Patches 83 Vulnerabilities

Microsoft released 83 vulnerability patches in March 2026, including one critical remote code execution flaw and several privilege escalation bugs requiring attention.
fromSecurityWeek
2 months ago

Adobe Patches 80 Vulnerabilities Across Eight Products

The company rolled out fixes for 19 flaws in Adobe Commerce and Magento Open Source, urging users to apply the patches within the next 30 days, based on these products being a known target for threat actors. The update resolves six high-severity bugs, five of which could lead to privilege escalation: CVE-2026-21290, CVE-2026-21361, CVE-2026-21284, CVE-2026-21311, and CVE-2026-21309.
Information security
#cybersecurity-funding
European startups
fromSecurityWeek
2 months ago

Escape Raises $18 Million to Automate Pentesting

Escape raised $18 million in Series A funding to automate offensive security with AI agents that discover, test, and fix vulnerabilities within existing workflows.
European startups
fromSecurityWeek
2 months ago

Escape Raises $18 Million to Automate Pentesting

Escape raised $18 million in Series A funding to automate offensive security with AI agents that discover, test, and fix vulnerabilities within existing workflows.
Information security
fromSecurityWeek
2 months ago

Recent Ivanti Endpoint Manager Flaw Exploited in Attacks

CISA added three critical vulnerabilities to its Known Exploited Vulnerabilities catalog, requiring federal agencies to patch them within one to two weeks due to active exploitation threats.
Information security
fromThe Hacker News
2 months ago

CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited

CISA added three actively exploited vulnerabilities to its KEV catalog, including critical flaws in SolarWinds Web Help Desk, Omnissa Workspace One UEM, and Ivanti Endpoint Manager, with federal agencies required to patch by mid-to-late March 2026.
Information security
fromThe Hacker News
2 months ago

Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog

CISA added two critical vulnerabilities affecting Hikvision and Rockwell Automation products to its Known Exploited Vulnerabilities catalog due to active exploitation evidence.
Information security
fromSecuritymagazine
2 months ago

Would You Trust an AI Pentester to Work Solo?

AI-powered pentesting excels at speed and pattern recognition but requires human guidance to validate contextual vulnerabilities and novel attack paths that matter most to organizations.
fromTheregister
2 months ago

Rapid AI-driven development makes security unattainable

Security debt as 'known vulnerabilities left unresolved for more than a year' now affects 82 percent of companies, up from 74 percent a year ago. High-risk vulnerabilities, meaning flaws that are both severe and likely to be exploited, have risen from 8.3 percent to 11.3 percent.
Information security
Information security
fromSecurityWeek
2 months ago

Cogent Security Raises $42 Million for AI-Driven Vulnerability Management

Cogent Security raised $42M Series A to build autonomous AI agents that automate vulnerability investigation, prioritization, and remediation across environments.
Information security
fromComputerWeekly.com
2 months ago

CVE volumes may plausibly reach 100,000 this year | Computer Weekly

Disclosed CVEs may exceed 50,000 in 2026, with realistic scenarios reaching 70,000–100,000 and an urgent need to scale and prioritise vulnerability response.
#cisa-kev
Information security
fromThe Hacker News
3 months ago

ThreatsDay Bulletin: New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

Small, quiet shifts across systems—abused trusted tools and unnoticed vulnerabilities—are causing privilege escalation, cryptomining infections, and broader erosion of access, data, and trust.
#cve
Information security
fromThe Hacker News
3 months ago

Exposure Assessment Platforms Signal a Shift in Focus

Exposure Assessment Platforms replace traditional Vulnerability Management by providing continuous, risk‑prioritized, cross‑layer visibility to reduce alert fatigue and address “dead‑end” exposures.
Information security
fromTechzine Global
3 months ago

From vulnerability whack-a-mole to strategic risk operations

Shift security from counting vulnerabilities to strategic risk operations that prioritize exposure, value at risk, and measurable business outcomes.
fromAzure DevOps Blog
4 months ago

Work item linking for Advanced Security alerts now available - Azure DevOps Blog

Security vulnerabilities don't fix themselves. Someone needs to track them, prioritize them, and actually ship the fix. If you've ever tried to manage security alerts alongside your regular sprint work, though, you know the friction: you're looking at an alert in one tab, switching to your backlog in another, trying to remember which vulnerability you were supposed to file a bug for.
Information security
Information security
fromThe Hacker News
5 months ago

SecAlerts Cuts Through the Noise with a Smarter, Faster Way to Track Vulnerabilities

SecAlerts provides fast, affordable, non-invasive cloud-based vulnerability alerts matched to listed software, reducing noise and prioritizing actionable risks.
Information security
fromComputerworld
5 months ago

Why security needs a step change to thwart cyber attacks amid surging innovation

Enterprises must implement comprehensive vulnerability management—including automated scanning, prompt patching, and scalable penetration testing—to prevent preventable breaches and reduce attack surfaces from AI adoption.
fromNew Relic
5 months ago

How to Keep a Secure Environment with New Relic: Your Observability Shield

However, this change has come with some difficulties, since all our business information is stored online there has also been a spike in criminals who want to get profit out of stealing said information or preventing business operations. Just in 2024, the FBI has reported over $16.6 billion in losses related to cybercrime, and this value is only increasing year over year making that an "observable" environment must also be a "secure" one.
Information security
Information security
fromThe Hacker News
5 months ago

When Attacks Come Faster Than Patches: Why 2026 Will be the Year of Machine-Speed Security

Newly disclosed vulnerabilities are frequently weaponized within 48 hours, forcing defenders to outpace automated, AI-enhanced attacker workflows and abandon slow patch cadences.
Information security
fromThe Hacker News
6 months ago

Bridging the Remediation Gap: Introducing Pentera Resolve

Operational gaps, not visibility, prevent timely remediation of vulnerabilities detected across fragmented security tools; continuous, validated, and automated remediation workflows are required.
Venture
fromSecurityWeek
7 months ago

Mondoo Raises $17.5 Million for Vulnerability Management Platform

Mondoo raised $17.5 million in a Series A extension to expand its agentic vulnerability management platform and grow US and EMEA operations.
Information security
fromComputerworld
7 months ago

Why IT/Security alignment is the key to efficient operations

Misalignment between IT and security—driven by differing mandates and siloed data—creates unpatched vulnerabilities, delayed incident response, and increased operational and regulatory risk.
fromSecurityWeek
7 months ago

Virtual Event Today: Attack Surface Management Summit

SecurityWeek's Attack Surface Management Virtual Summit is now LIVE and runs today from 11AM - 4PM ET. Join the online event where cybersecurity leaders and practitioners will dive into the strategies, tools, and innovations shaping the future of ASM. As digital assets and cloud services continue to expand, defenders are shifting tactics to continuously discover, inventory, classify, prioritize, and monitor their attack surfaces.
Information security
Information security
fromSecuritymagazine
8 months ago

Why It's Time to Shift to Preemptive Exposure Management

Organizations must adopt preemptive, automated exposure management using AI and behavioral analytics because patching alone cannot stop rapidly increasing vulnerability exploitation.
DevOps
fromThe Hacker News
8 months ago

Automation Is Redefining Pentest Delivery

Automating pentest finding delivery enables real-time, actionable remediation, reduces delays from static reports, and standardizes workflows for faster vulnerability lifecycle management.
Information security
fromBusiness Matters
8 months ago

Cyber attack whack-a-mole dynamics call for strategic exposure management

Prioritize continuous threat exposure management (CTEM) to proactively discover, prioritize, and mitigate cyber risks in an AI-driven, constantly evolving threat landscape.
[ Load more ]