The National Institute of Standards and Technology is preparing to shift its role in the globally-adopted vulnerability ...
In response to continued uncertainty around the future of the MITRE-run Common Vulnerabilities and Exposures (CVE) program, a European cybersecurity organization has launched the Global CVE Allocation ...
The GCVE program emerged in response to broader concerns about resilience, sustainability, and potential single points of failure in the existing CVE program, explains Haiman Wong, fellow, ...
Keeping up with new privacy and cybersecurity laws has proved challenging for enterprises, many of which struggle to understand which laws even apply to them. Artificial intelligence (AI) complicates ...
Critical remote code execution and database theft flaws highlight patching gaps and the hidden risk inside business ...
The Vulnerability Registration Service, a cross-sector database holding one million records of vulnerable individuals, has ...
A critical Grist-Core flaw (CVE-2026-24002, CVSS 9.1) allows remote code execution through malicious formulas when Pyodide ...
The study used data from EM-DAT, the largest public database of disaster-related deaths. Rather than focusing on individual catastrophes, the research uses a statistical approach designed to reveal ...
The debate should no longer be whether or not to use AI, but rather how to deploy it without losing perspective and control ...
SLO County needs data protection policies that place transparency, real action and accountability in the foreground,” writes.
January 2026 was a wake-up month for enterprise security teams. In a single week, CERT-In released three high-severity ...
A threat actor is believed to have hijacked over 1,400 hijacking unprotected MongoDB instances to extort their owners.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results