From CVSS to RBVM: vulnerability prioritization done right
Causes of discrepancies in Common Vulnerability Scoring System ratings, common mistakes when using CVSS for vulnerability prioritization, and how to do this right.
1061 articles
Causes of discrepancies in Common Vulnerability Scoring System ratings, common mistakes when using CVSS for vulnerability prioritization, and how to do this right.
Two critical zero-day vulnerabilities in SharePoint are actively exploited by attackers in real-world attacks.
How the research tool Defendnot disables Microsoft Defender by registering a fake antivirus, and why you shouldn’t always trust what your operating system says.
This is a story of how a blockchain developer lost US$500 000 to a fake Solidity extension from the Open VSX marketplace.
How cybercriminals can exploit your online store — and how to stop them.
Drawing from INTERPOL’s just-released Africa Cyberthreat Assessment Report, we identify which threats most often target developing businesses – and how to stop them.
Researchers have found several vulnerabilities in the Sitecore CMS platform that enable unauthenticated remote code execution (RCE).
Researchers have found a vulnerability that allows attackers to get root privileges on most Linux distributions.
Internet Explorer sends its regards: a vulnerability in the HTTP protocol extension allows attackers to run malicious code — even on a modern operating system.
Since 2016, a threat actor has been exploiting insecure plugins and themes to infect WordPress websites and redirect traffic to malicious websites.
A popular password manager was modified to allow attackers to steal passwords and encrypt users’ data. How to protect home computers and corporate systems from this threat?
This post examines a hybrid email-and-phone scam in which attackers send emails from a genuine Microsoft email address.
Scammers are using Google ads to push fake versions of real websites – and they’re after business accounts and company data.
How the situation with ransomware attacks on companies has changed, and why paying a ransom has become an even worse and more useless idea in 2025.
An infection tactic called ClickFix is becoming increasingly popular among cybercriminals. We explain how such attacks work and how to protect your company against it.
Popular AI code assistants try to call non-existent libraries. But what happens if attackers actually create them?
Archives are being used in targeted phishing and other attacks on organizations. What tools, settings, and policies can mitigate the threat?
Scammers are exploiting GetShared to bypass email security.
Attackers use the polyglot technique to disguise malware. We explain what it is and how to protect your company against attacks.
Fending off ransomware attacks that exploit corporate IoT devices.