Monitoring Changes in KEV List Can Guide Security Teams Posted on August 7, 2024 The number of additions to the Known Exploited Vulnerabilities catalog is growing quickly, but even silent changes to already-documented flaws can help security teams prioritize.
Unpatched Windows Zero-Day Flaw Exploited by 11 State-Sponsored Threat Groups Since 2017 News An unpatched security flaw impacting Microsoft Windows has been exploited… rooter March 18, 2025 1 min read 0
ClickFix Attack Compromises 100+ Car Dealership Sites News The ClickFix attack tactic seems to be gaining traction among… rooter March 17, 2025 1 min read 0
Ben Affleck Says He’s Done With DC Films, No Matter Who’s in Charge News Ben Affleck is currently promoting both his new equity-first production… rooter March 16, 2023 1 min read 0
UK won the Military Cyberwarfare exercise Defence Cyber Marvel 2 (DCM2) News Defence Cyber Marvel 2 (DCM2) is the largest Western Europe-led… rooter February 24, 2023 2 min read 0